Documents Product Categories Firewall as a Service - Powered by Fortinet

Firewall as a Service - Powered by Fortinet

Jun 12, 2025
Status page. You can switch regions using the region selector and access FortiGate Cloud documentation from the ? icon. The Dashboard > Status page displays a variety of widgets. The widgets provide information about the devices that your FortiGate Cloud manages, such as how many FortiGates have subscriptions. Dashboard > Security provides details on the FortiSandbox URL threat database version. From the banner, you can access options including the following: Option Description FortiGate quick selection menu Select a FortiGate from the dropdown list to access it. See Accessing a FortiGate on page 26. Menu icon Use the menu icon to collapse or display the left pane, which displays other FortiGate Cloud 25.2 Administration Guide 10 Fortinet Inc.Introduction Option Description configuration options. Search icon Click the search icon to access a searchbar. You can search for a FortiGate Cloud GUI page or widget with a name that contains your search term. See To search for a GUI page or widget: on page 11. Services Access another Fortinet service. Support Access Fortinet support options, such as contacting the Fortinet support team. Region selection Select another region to access FortiGate Cloud in. Demo resources View use case videos and access FortiGate Cloud documentation for accounts created within the past 90 days. Documentation link Access FortiGate Cloud documentation. Notifications View and acknowledge notifications, such as for upcoming automatic FortiGate firmware upgrades. Preferences Configure dark or light theme, language to display FortiGate Cloud in, and other settings. User menu dropdown Displays the current logged in user. You can use the dropdown list to switch accounts or view account settings. To search for a GUI page or widget: 1. In the banner, click the search icon. 2. In the Search field, enter the desired search term. FortiGate Cloud searches for GUI page names and Dashboard widget names that contain your search term. 3. FortiGate Cloud displays the search results. You can filter the results by Navigation menu or Dashboard widget on the left pane, and sort by relevance or ascending or descending alphabetical order in the upper right corner. Use the search results to navigate to the desired page or widget. From the left pane, you can access other options including assets, Sandbox, analytics, and configuration features. The following describes the portal options available from the left pane: Option Description Dashboard Dashboarddisplays a variety of widgets. The widgets provide information about the devices that your FortiGate Cloud is managing. Assets View a centralized inventory of all FortiGate and FortiWifi devices. See Assets on page 22. Sandbox View the scan results from files that Sandbox submitted to FortiGuard for threat analysis. See Sandbox on page 29. Analytics Create and alter report configurations and their settings. These report configurations are available for all deployed devices. See Analytics on page 32. FortiGate Cloud 25.2 Administration Guide 11 Fortinet Inc.Introduction Option Description Configuration Manage FortiGate Cloud account and Sandbox settings. See Configuration on page 69. CLI Scripts Configure and schedule scripts of CLI commands to run on your FortiGates. See CLI scripts on page 71. Administration Configure automation and firmware management options. See Administration on page 72. Audit View a log of actions that users have performed on FortiGate Cloud. Port and access control information FortiGate Cloud uses TCP ports 80, 443, 514, and 541. IP address ranges differ depending on the region: FortiGate Cloud can also use internet service database (ISDB) objects. To use ISDB to allowlist control outgoing traffic to FortiGate Cloud, you must use both Fortinet-FortiCloud and Fortinet-FortiSandbox. See Internet service database objects. Region IP address range Global 208.91.113.0/24, 173.243.132.0/24 Japan 210.7.96.0/24, 148.230.40.0/24 EU 154.52.10.0/24, 154.45.6.0/24 US 154.52.4.0/24,209.40.117.0/24 The following summarizes FortiSandbox SaaS (SaaS) information for FortiGate Cloud: Region IP address range Global 173.243.139.0/24, 184.94.112.0/24, 154.52.26.0/24 Japan 210.7.96.0/24, 154.52.7.0/24 EU 83.231.212.128/25, 154.45.1.0/24, 154.52.11.0/24 US 209.40.106.192/26, 209.66.107.0/24 License types The following are essential licenses to use FortiGate Cloud: FortiGate Cloud 25.2 Administration Guide 12 Fortinet Inc.Introduction Description SKU FortiGate Cloud subscription Management, Analytics, and one-year log retention for FortiGate, FortiGate FC-10-00XXX-131-02-DD VM/VM-S, and FortiWiFi FortiGate Cloud Advanced license Management, Analytics, and one-year log retention, plus SD-WAN overlay-as-a- FC-10-XXXXX-1125-02-DD service and extended security operations (indicators of compromise) The following are add-on licenses to enhance your FortiGate Cloud: Description SKU FortiSandbox SaaS (per device) FortiSandbox Saas for FortiGate FC-10-XXXXX-811-02-DD FC-10-XXXXX-950-02-DD FC-10-XXXXX-928-02-DD FC-10-XXXXX-100-02-DD FortiDeploy Bulk provisioning FDP-SINGLE-USE The FortiGate Cloud subscription for management, analytics, and one-year log retention is available for FortiGates or FortiWiFi devices (per device) with a one-, three-, or five- year service term. High availability clusters require a subscription for each device. For multitenancy using FortiCloud organizations, see Standard versus unlimited access to the Organization Portal. For FortiSandbox SaaS upload limits, see Sandbox on page 29. Provisioning FortiGates to FortiGate Cloud does not require a subscription. For limitations without a subscription, see Feature comparison on page 13. All devices must be registered on the Fortinet Support site. For pricing information, contact your Fortinet partner or reseller. FortiGate Cloud reserves the right to impose limits upon detection of abnormal or excessive traffic originating from a certain device and perform preventive measures including blocking the device and restricting log data. Feature comparison FortiGate Cloud offers a different feature set depending on whether or not the device has a paid subscription. The following chart shows the features available for FortiGate Cloud for these scenarios: FortiGate Cloud 25.2 Administration Guide 13 Fortinet Inc.Introduction Feature No subscription FortiGate Cloud FortiGate Cloud subscription Advanced subscription CLI scripts No Yes Yes Cloud access Read-only Read/write Read/write Cloud management, No Yes Yes configurations, and backups Cloud provisioning Yes Yes Yes Customizable patch No Disabled by default and Disabled by default and firmware upgrade can be enabled can be enabled Event automation No Yes Yes Extended security No No Yes operations (indicators of compromise) Hosted log retention Seven days One year One year Manual firmware upgrade Yes, only to the latest patch Yes Yes available. You must manually upgrade a FortiGate without a paid subscription to the latest patch within seven days of the patch becoming available. If the FortiGate is not upgraded within seven days, log upload and cloud access are restricted. See Firmware management on page 73. Raw log download No Yes Yes Remote access Yes (read-only) Yes (read-write) Yes (read-write) For the following FortiOS versions, remote access with full permission (read and write) requires a registered FortiGate Cloud Service subscription on the FortiGate. l 7.6.0 and later versions l 7.4.2 and later versions l 7.2.8 and later FortiGate Cloud 25.2 Administration Guide 14 Fortinet Inc.Introduction Feature No subscription FortiGate Cloud FortiGate Cloud subscription Advanced subscription versions l 7.0.14 and later versions Devices without a registered FortiGate Cloud Service Subscription running these FortiOS versions only support read- only remote access. Reports 360 degree activity report Multiple predefined reports Multiple predefined reports only SD-WANmonitoring No Yes Yes SD-WAN overlay-as-a- No No Yes service FortiGate Cloud 25.2 Administration Guide 15 Fortinet Inc.Dashboard You see the Dashboard > Status page when you first open the FortiGate Cloudinterface. The widgets provide information about the devices that your FortiGate Cloud manages, such as how many FortiGates have subscriptions. For most widgets, you can click in to a section of the widget''s displayed chart to view more details. For example, for the FortiGate subscription statuses widget, you can click the green portion of the donut chart, which represents the FortiGates that have a subscription. FortiGate Cloud then displays the Assets > Asset list filtered to only display FortiGates that have a subscription. FortiGate Cloud contains the following dashboards: l Status l Security l Network l SD-WAN l FortiView You can also create a custom dashboard. The following tables list the widgets available for each dashboard: FortiGate Cloud 25.2 Administration Guide 16 Fortinet Inc.Dashboard Status Widget Description FortiGate subscription statuses Displays how many FortiGates do not have a paid subscription and how many have a subscription. Some features, such as the SD-WAN dashboard, require a separate license. See License types on page 12. CPU health Displays CPU usage statistics for the last hour for the connected FortiGates. Top CPU usage Displays FortiGates with the top CPU usage. Memory health Displays memory usage statistics for the last hour for the connected FortiGates. Top memory usage Displays FortiGates with the top memory usage. Reports utilization Shows a summary of the utilization of analytic reports. Configuration backups Shows status of FortiGate configuration backups. Automation status Shows number of configured automation stitches and trigger counts. Network Widget Description Management connectivity health Displays tunnel uptime and the number of FortiGates that are online and offline. Fabric device overview Displays the platforms for the Fortinet Security Fabric devices connected to FortiGate Cloud. Analytics connectivity Displays the status of the Analytics services. Security Widget Description FortiSandbox Cloud status Displays the database versions and last updated dates for the dynamic malware and URL threat databases. Top FortiSandbox files Displays the most commonly analyzed file types in the last 24 hours of scanning. FortiSandbox scan results Shows the last seven days of results and their risk levels. FortiGate Cloud 25.2 Administration Guide 17 Fortinet Inc.Dashboard Widget Description FortiGuard security alerts Displays FortiGuard security alert information and schedule upgrades for FortiGates susceptible to critical vulnerabilities. Indicators of compromise Only applies if you have a FortiGate with a legacy standalone indicator of (standalone) compromise (IOC) license which has not reached expiry. If so, this widget displays compromised hosts data from devices with a standalone IOC contract and a link to the IOC portal. This widget does not display if you are using the new IOC service, which the Advanced license supports. See IOC on page 37. Risk website visitors Users who visited a website determined as a risk. Malware victims Users whose device is affected by malware. Malware targets ?? Spam targets User whose device is affected by spam. Data rule violators Users who violated data rules. Risk application users Users who used an application determined as a risk. Attack targets Users whose device is affected by an attack. Intrusion targets Users whose device is affected by an intrusion. FortiGate Cloud 25.2 Administration Guide 18 Fortinet Inc.Dashboard SD-WAN The widgets on this dashboard only display information for FortiGates with an SD-WAN underlay and application monitoring license (SKU: FC-10-*-288-02-12). Widget Description SD-WAN interfaces Displays SD-WAN interface statistics. SD-WAN performance SLA - all Displays SD-WAN performance SLA status across all FortiGates with an FortiGates SD-WAN underlay and application monitoring license. SD-WANQoE Displays SD-WAN quality of experience status. FortiGate Cloud 25.2 Administration Guide 19 Fortinet Inc.Dashboard Widget Description SD-WAN performance SLA Displays SD-WAN performance SLA status. SD-WAN utilization by rule Sankey chart to visualize traffic flows from rules to applications and SD-WAN members. SD-WAN utilization by Bar chart to visualize most used applications for each SD-WANmember. application SD-WAN speed test results View SD-WAN speed test results within a specified seven-day range. FortiView The widgets on this dashboard only display information for FortiGates with a subscription. Widget Description Top sources Top traffic sessions aggregated by source. Top destinations Top traffic sessions aggregated by destinations. Top threats Top traffic sessions aggregated by threats. Top websites Top traffic sessions aggregated by websites. Top attacks Counts the attacks that the device''s IPS most frequently prevents. Top applications Compares which applications are most frequently used, based on the device''s Application Control settings. Top application categories Compares which application categories are most frequently used, based on the device''s Application Control settings. Top applications by threat score Compares which applications have the most traffic compared to their threat score, based on the device''s Application Control settings. Top DLP by rules Counts the DLP events that the device detects, sorted by DLP rule. Top spam Displays which sources send the most spam email into the network. Top virus Counts the viruses that the device''s AV most frequently finds. Top protocols Compares the traffic volume that has passed through a certain interface, based on which protocol it uses: l HTTP l HTTPS l DNS l TCP l UDP l Other FortiGate Cloud 25.2 Administration Guide 20 Fortinet Inc.Dashboard Widget Description Top users/IP by browsing time in Compares which users visit which IP addresses most frequently in the greatest seconds ratio. You can click a user to see which IP addresses they visit. Top web categories Compares which web filtering categories are most frequently used, based on the device''s Web Filtering settings. System activity System events that occurred on the device. Admin session Admin sessions on the device. Failed login Failed admin login attempts on the device. Wireless Wireless network connection events on the device. VPN - site to site Site-to-site VPN connections and related incidents. VPN - SSL and dialup SSL and dialup VPN connections and users using these connections. Failed VPN login Failed VPN tunnel login attempts on the device. FortiGate Cloud 25.2 Administration Guide 21 Fortinet Inc.Assets Assets > Asset list displays a centralized inventory of all FortiGate and FortiWifi devices from all FortiGate Cloud instances in a domain group. For example, if you access Assets from the Europe region, you see the region of a connected FortiGate Cloud instance from the Europe region. For instructions on deploying a FortiGate to FortiGate Cloud, see Cloud provisioning on page 24. You can view the device CPU and memory usage under the Current diagnostics column. The Asset list page provides the following information about devices. Asset list displays the following device information, among others: l Serial number l Fortinet product type l Firmware version l Management connectivity status (If the device is connected through a management tunnel) l Current diagnostics (device CPU and memory usage) l Subscription status l Configuration save mode. See Using configuration save mode. l Last log upload time l Folder name: asset folder that the device belongs to. FortiGate Cloud pulls the folder structure from FortiCloud. You can use the dropdown list on the right to view FortiGates grouped by subscription status or high availability cluster, or with no grouping. In the example,Group by subscription is selected. FortiGate Cloud displays the list of FortiGates separated into two groups: FortiGates with a subscription and FortiGates without a subscription. FortiGate Cloud 25.2 Administration Guide 22 Fortinet Inc.Assets To view historical diagnostics data for a device: 1. Go to Assets > Asset list. 2. Right-click the desired device, then select View diagnostics. FortiGate Cloud displays historical diagnostics data for the device. You can select go to Assets > Asset map to view the device list as a map. This allows you to see the geographic location of the deployed devices. The right panel displays a list of FortiGates that includes similar information as you can find in Asset list. You can click the Locate on map icon for each device to zoom in to the device''s location on the map. You can zoom in and out on the map using the + and - buttons in the lower right corner of the map. To return the map to the global view, click Reset map. For devices with a subscription, you can update their geolocation by dragging the device icon to the desired location on the map. To assign a firmware profile: 1. Go to Assets > Asset list. 2. Select device(s) and click Actions > Assign firmware profile. 3. On the Assign firmware profile slider-in, select the desired firmware profile. 4. ClickOK to assign a firmware profile. See Firmware management on page 73. FortiGate Cloud 25.2 Administration Guide 23 Fortinet Inc.Assets Cloud provisioning Cloud provisioning or deployment is the mechanism to connect a FortiGate to FortiGate Cloud and configure it for cloud management and logging. You can provision a FortiGate to FortiGate Cloud using one of the following methods: l FortiCloud key l FortiCloud inventory l FortiOS GUI After provisioning a FortiGate to FortiGate Cloud using one of the methods described, complete basic configuration by doing the following: 1. Create a firewall policy with logging enabled. Configure log uploading if necessary. 2. Log in to FortiGate Cloud using your FortiCloud account. For FortiGates that are part of a high availability (HA) pair, you must activate FortiGate Cloud on the primary FortiGate. Activate FortiGate Cloud on the primary FortiGate as To provision a FortiGate or FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 25 describes. FortiGate Cloud activation on the primary FortiGate activates FortiGate Cloud on the secondary FortiGate. Local FortiGate Cloud activation on the secondary FortiGate will fail. To provision a FortiGate/FortiWifi to FortiGate Cloud using the FortiCloud key: 1. Log in to FortiGate Cloud. 2. Go to Assets > Asset list, then click Add FortiGate. 3. Click Import FortiGate. 4. In the FortiCloud or FortiDeploy key field, enter your key value. 5. For End user type, select A non-government user or A government user as required. 6. From the Partner dropdown list, select the affiliated Fortinet partner. 7. To provision your FortiGate to FortiGate Cloud after import, enable Provision after import. 8. ClickOK. After the device is successfully deployed, the device key becomes invalid. You can only use the key once to deploy a device. To provision a FortiGate or FortiWifi to FortiGate Cloud using the inventory: 1. Log in to the FortiGate Cloud. 2. Go to Assets > Asset list, then click Add FortiGate. Do one of the following: 3. Select the desired device from the displayed inventory. This displays all assets from the logged-in FortiCloud account. Click Provision > Provision to FortiGate Cloud. 4. From the Select Display Timezone for Device dropdown list, select the desired time zone. 5. Click Submit. FortiGate Cloud 25.2 Administration Guide 24 Fortinet Inc.Assets To provision a FortiGate or FortiWifi to FortiGate Cloud in the FortiOS GUI: 1. In the FortiCloud portal, ensure that you have a product entitlement for FortiGate Cloud for the desired FortiGate or FortiWifi. 2. In FortiOS, in the Dashboard, in the FortiGate Cloud widget, the Status displays as Not Activated. Click Not Activated. 3. Click the Activate button. 4. In the Activate FortiGate Cloud panel, the Email field is already populated with the FortiCloud account that this FortiGate is registered to. 5. In the Password field, enter the password associated with the FortiCloud account. 6. Enable Send logs to FortiGate Cloud. ClickOK. 7. This should have automatically enabled Cloud Logging. Ensure that Cloud Logging was enabled. If it was not enabled, go to Security Fabric > Fabric Connectors > Cloud Logging, enable it, then set Type to FortiGate Cloud. 8. You must set the central management setting to FortiCloud, as this is the initial requirement for enabling device management features. To configure a FortiGate-VM for FortiGate Cloud: FortiGate-VMs require additional configuration to ensure that they function with FortiGate Cloud. Run the following commands in the FortiOS CLI: config system fortiguard unset update-server-location end FortiGate Cloud 25.2 Administration Guide 25 Fortinet Inc.Assets Accessing a FortiGate When you run a function in FortiGate Cloud that applies to FortiGates, such as running a script, FortiGate Cloud does not pass the actual username of the user who performed the action to FortiOS: For remotely accessing a FortiGate from FortiGate Cloud, FortiGate Cloud passes the username of the FortiGate Cloud user who performed the action as a randomized @fortigatecloud.com email address, such as 4aa567e55bc8@fortigatecloud.com, to FortiOS. For other management features that a user can perform from FortiGate Cloud, such as running a script, FortiGate Cloud passes the username of the FortiGate Cloud user who performed the action as FortiGateCloud to FortiOS. Therefore, when viewing logs on the affected FortiGate, you may see 4aa567e55bc8@fortigatecloud.com or FortiGateCloud as a username. For managed security service provider customers, this provides enhanced security by preventing subusers from seeing the primary account email address in the FortiGate logs. You can access the remote device management interface to configure major features as if you were accessing the device itself. For configuration option descriptions, see the FortiOS documentation. For devices with a subscription that are upgraded to FortiOS 7.0.2 or a later version, you have full access to configure features. For devices without a subscription, you have a read-only view of the configuration. To remotely access and configure a FortiGate: 1. Do one of the following: l In the upper left corner, click the FortiGate Cloud dropdown list and select the desired FortiGate. l Go to Assets > Asset list. Select the desired FortiGate, then click Cloud access. 2. If the FortiGate does not have a subscription, FortiGate Cloud displays a warning that you will have read-only access. ClickOK. 3. FortiGate Cloud displays the FortiOS interface in the browser window. You do not need to enter credentials to log in to the FortiGate. View and make changes as desired. The following shows the FortiOS GUI as shown in FortiGate Cloud, in light and dark modes: FortiGate Cloud 25.2 Administration Guide 26 Fortinet Inc.Assets FortiGate Cloud 25.2 Administration Guide 27 Fortinet Inc.Assets 4. Return to FortiGate Cloud using the icons on the left pane. FortiGate Cloud 25.2 Administration Guide 28 Fortinet Inc.Sandbox FortiSandbox SaaS is a service that uploads and analyzes files that FortiGate antivirus (AV) marks as suspicious. In a proxy-based AV profile on a FortiGate, the administrator selects Send files to FortiSandbox for inspection to enable a FortiGate to upload suspicious files to FortiGuard for analysis. Once uploaded, the file is executed and the resulting behavior analyzed for risk. If the file exhibits risky behavior or is found to contain a virus, a new virus signature is created and added to the FortiGuard AV signature database. The next time the FortiGate updates its AV database it has the new signature. The turnaround time on Cloud Sandboxing and AV submission ranges from 10 minutes for automated SandBox detection to 10 hours if FortiGuard Labs is involved. FortiGuard Labs considers a file suspicious if it exhibits some unusual behavior, yet does not contain a known virus. The behaviors that FortiGate Cloud Analytics considers suspicious change depending on the threat climate and other factors. FortiGate Cloud enables you to view the status of any suspicious files uploaded: pending, clean, identified as malware, or unknown. The console also provides data on the time, user, and location of the infected file for forensic analysis. The Sandbox page collects information that the FortiSandbox SaaS service compiles. FortiSandbox SaaS submits files to FortiGuard for threat analysis. You can configure your use of the service and view analyzed files'' results. FortiSandbox SaaS regions include Global, Europe, U.S., and Japan. FortiSandbox SaaS allows the following file upload sources: l File uploads from FortiGate: l For a FortiGate without a FortiSandbox SaaS subscription, FortiSandbox SaaS supports up to 100 uploads per day or two uploads per minute. See License types on page 12 l For FortiGates with a FortiSandbox SaaS subscription, the following upload limits apply: FortiGate model Per minute Per day FortiGate 30-90/VM00 5 7200 FortiGate 100-400/VM01 10 14400 FortiGate 500-900/VM02, VM04 20 28880 FortiGate 1000-2000/VM08, VM16 50 72000 FortiGate 3000/VM32 and higher models 100 144000 l For manual uploads from FortiGate Cloud, FortiSandbox SaaS supports up to 50 uploads per day per account. To set up Sandbox: 1. Complete the FortiGate Cloud Sandbox (FortiSandbox SaaS) steps. 2. In Security Profiles > AntiVirus, create a profile that has Send files to FortiSandbox for inspection configured. 3. Create a firewall policy with logging enabled that uses the Sandbox-enabled AV profile. 4. Once devices have uploaded some files to FortiSandbox SaaS, log in to FortiGate Cloud to see the results. FortiGate Cloud 25.2 Administration Guide 29 Fortinet Inc.Sandbox To upload a sample to Sandbox: 1. Go to Sandbox > Scan results. 2. Click Upload sample. 3. Browse to and select a file to upload, then click Submit. Once analysis completes, Scan results displays the results. Settings In Settings > Sandbox settings, you can configure FortiSandbox SaaS settings: Setting Description l Enable alert emails l Enter multiple email addresses (separated by commas) to receive Enable Alert Setting alerts l Set which severity levels trigger FortiGate Cloud to send alert emails Log Retention Set number of days to retain log data. Malware Package Options Select the data risk level that FortiGate Cloud automatically submits to URL Package Options FortiGuard to further antithreat research. Device Selections Select the desired FortiGates to enable Sandbox detection for. FortiGate Cloud 25.2 Administration Guide 30 Fortinet Inc.Sandbox To configure Sandbox alert emails: 1. Go to Sandbox > Sandbox settings. 2. Select Enable Alert Setting. 3. Enter email addresses into the list to contact in the event of a Sandbox alert. 4. Select the severity levels to trigger an alert. 5. Click Apply. FortiGate Cloud 25.2 Administration Guide 31 Fortinet Inc.Analytics Analytics provide tools for monitoring and logging your device''s traffic, providing you centralized oversight of traffic and security events. You can generate and view reports of specific traffic data. You can configure FortiGate Cloud to generate reports at scheduled times and run reports on-demand as desired. Reports To schedule a report: 1. Go to Analytics > Scheduled reports. 2. Select the desired report. 3. Click Customize. 4. In the Select FortiGate field, select the desired FortiGates to run the report for. 5. If desired, in Custom report logo, upload an image as the custom logo for the report. 6. In the Schedule type field, configure the desired schedule for the report. 7. If desired, enable Send report to and select an email address or email group to send the report to. 8. ClickOK. FortiGate Cloud generates the report as per the configured schedule. You can view these reports in Analytics > Generated reports. To run a report on-demand: 1. Go to Analytics > Scheduled reports. 2. Select the desired report, then click Run report. 3. In the Select FortiGate field, select the desired FortiGates to run the report for. 4. In the Start time and End time fields, configure the desired time range to include in the report. 5. If desired, enable Send report to and select an email address or email group to send the report to. 6. ClickOK. FortiGate Cloud generates the report. You can view these reports in Analytics > Generated reports. To configure an email group to send a report to: 1. Create an email group: a. Go to Analytics > Scheduled reports. b. ClickManage email groups. c. Click Create. d. In the Name field, enter the email group name. e. In the Subject field, enter the email subject line. f. In the Body field, enter the email body content. g. In the Description field, enter the email description. FortiGate Cloud 25.2 Administration Guide 32 Fortinet Inc.Analytics h. In the To field, enter the email addresses to send the email to. i. ClickOK. 2. Select the desired report, then click Customize. FortiGate Cloud 25.2 Administration Guide 33 Fortinet Inc.Analytics 3. Enable the Send report to toggle. From the Send report to dropdown list, select the desired email group. 4. ClickOK. Reports reference The following provides descriptions of report templates: FortiGate Cloud 25.2 Administration Guide 34 Fortinet Inc.Analytics Reports for FortiGates without a paid subscription The 360 Degree Activities Report is the only report available for FortiGates without a paid subscription. It is a general activities report on all FortiGates without a paid subscription. You cannot customize or schedule this report. FortiGate Cloud automatically runs this report weekly. Reports for FortiGates with a subscription You can schedule reports using a maximum of 10 report templates with a subscription. The following lists all available report templates: l 360 Degree Activities Report l 360-Degree Security Review l 360 Protection Report l Admin and System Events Report l Application Risk and Control l Bandwidth and Applications Report l Cyber-Bullying Indicators Report l Cyber Threat Assessment l Daily Summary Report l Detailed Application Usage and Risk l DNS Report l DNS Security Report l High Bandwidth Application Usage l PCI DSS Compliance Review l SaaS Application Usage Report l Secure SD-WAN Assessment Report l Secure SD-WAN Report l Security Analysis l Security Events and Incidents Summary l Self-Harm and Risk Indicators Report l Threat Report l Top 20 Categories and Applications (Bandwidth) l Top 20 Categories and Applications (Session) l Top 20 Category andWebsites (Bandwidth) l Top 20 Category andWebsites (Session) l Top 500 Sessions by Bandwidth l User Detailed Browsing Log l User Security Analysis l User Top 500Websites by Bandwidth l VPN Report l Web Usage Report l What is New Report l WiFi Report FortiGate Cloud 25.2 Administration Guide 35 Fortinet Inc.Logs In Logs, you can view and download FortiOS traffic, security, and event logs. You can use the dropdown list on the upper right corner to select the desired FortiGate(s), and the time dropdown list to filter data for the desired time period. You can also use the log category dropdown list to filter data for the desired log category. The following provides a list of the available log types and subtypes: l Traffic: l Forward traffic l Local traffic l Multicast traffic l Sniffer traffic l Zero trust network access traffic l Security: l Anomaly l Antispam l Antivirus l Application control l Data loss prevention l DNS query l File filter l Intrusion prevention l SSH l SSL l VoIP l Web application firewall l Web filter l Events: l CIFS l Endpoint l General system l High availability l Router l SD-WAN l SDN connector l Security rating l User l VPN l Web proxy l WiFi FortiGate Cloud 25.2 Administration Guide 36 Fortinet Inc.To download a log: 1. Go to Analytics > LOG ARCHIVES > Raw logs. 2. Select the desired logs. 3. Click Download. The log downloads to your device. To browse raw logs: 1. Go to Analytics > LOG ARCHIVES > Raw logs. 2. Select a subscription FortiGate from the dropdown list on the right, then select the desired log file. 3. Click Browse logs. IOC The indicators of compromise (IOC) service alerts administrators about newly found infections and threats to devices in their network. By analyzing unified threat management logging and activity, IOC provides a comprehensive overview of threats to the network. IOC detects the following threat types, based on the evolving FortiGuard database: Threat type Description Malware Malicious programs residing on infected endpoints Potentially unwanted programs l Spyware FortiGate Cloud 25.2 Administration Guide 37 Fortinet Inc.Threat type Description l Adware l Toolbars Unknown Threats that the signature detected but does not associate with any known malware You can view infected devices'' full IP addresses, allowing you to better control their access to your network. This feature requires an Advanced license. See License types on page 12. When a compromised host is detected, FortiGate Cloud triggers an alert to the FortiGate with the automation stitch type set to Compromised Host. You can configure an automation stitch on your FortiGate to determine the appropriate action for handling the compromised host in response to the alert. For detailed instructions on setting up an automation stitch, see Creating automation stitches. To access IOC: Go to Analytics > Threats. This page displays a table of data for any detected threats. Above the table are the following options: Option Description Refresh Refresh the data in the table. Search Search for the desired threat. You can filter on the columns and values. FortiGate Select the desired FortiGate from the dropdown list. Time range Select the desired time range from the dropdown list. Export Export the data in the table to a CSV or JSON file. The table displays the following columns of data: FortiGate Cloud 25.2 Administration Guide 38 Fortinet Inc.Column Description Source (IP/User) IP address and username of the device where the threat was detected. Last Detected Last time that the threat was detected. Rescanned Whether the device was rescanned for the threat. Host Name Hostname of the device where the threat was detected. OS OS of the device where the threat was detected. Log Types Log types associated with the threat. Security Actions Security action taken with the traffic. Verdict Status of the device. # of Threats Number of threats present on the device. Device Name Device name where the threat was detected. FortiGate Cloud 25.2 Administration Guide 39 Fortinet Inc.SD-WAN Overlay SD-WAN overlay allows FortiGate devices to easily provision new SD-WAN overlay networks from FortiGate Cloud. SD- WAN overlay provides an easy-to-use GUI wizard that simplifies the process of configuring an SD-WAN overlay within a single region. This feature requires an Advanced license. See License types on page 12. The SD-WAN overlay hub acts as a bridge to allow overlay shortcuts to be formed between your spokes. SD-WAN overlay and the spokes rely on Fortinet Technologies Inc.’s Auto-Discovery VPN (ADVPN), which allows the central hub to dynamically inform spokes about a better path for traffic between two spokes. ADVPN shortcut tunnels, also known as shortcuts, are formed between spokes, such as between branches and the data center, or between branches themselves so that traffic does not need to pass through the hub. An Identity & Access Management user must have full read-write permission in the role-based access control profile to have admin access to SD-WAN overlay features. Starting May 3, 2025, the FortiCloud IAM portal supports an individual SD-WANOverlay role control under the FortiGate Cloud permission profile. Therefore, to have read-write or read-only access to the feature, you can configure it accordingly in the IAM portal. This feature is available in the Global, U.S., and Europe regions. Availability for Japan will be announced at a later time. Prerequisites The prerequisites of using the SD-WAN overlay in the FortiGate Cloud portal are as follows: l FortiOS 7.4.4 and later on the FortiGates acting as spokes. l FortiGate Cloud Advanced licenses for all spokes. l Sites must be running FortiOS 7.6.0 or later to support security profiles. For successful setup of ADVPN tunnels, the spokes’ ISPs must allow traffic over UDP port 500 and UDP port 4500 for NAT traversal (NAT-T). The SD-WAN overlay feature does not support FortiOS 7.6.1 or 7.6.2. FortiGate Cloud 25.2 Administration Guide 40 Fortinet Inc.SD-WANOverlay Creating the initial topology The following provides instructions for creating a topology to deploy the SD-WAN overlay configuration to your FortiGates. To create the initial topology: 1. Go to SDWan Overlay > Settings. 2. Set up the hub locations: a. Use the Primary Hub Locations and Secondary Hub Locations dropdown lists to select your locations. Select locations that are nearest to your site as this provides the best connectivity and backup. 3. Add a site as Creating a site on page 43 describes. 4. Configure the site to include ISP and subnet settings as Editing a site on page 45 describes. 5. Repeat these steps to add another site configuration. Not all FortiGate sites must be configured at once. You can add new sites, ISPs, and LAN subnets after you apply the initial configuration. See Creating a site on page 43, Editing a site on page 45 and Deploying the SD-WAN configuration to your sites and viewing tasks on page 41. Deploying the SD-WAN configuration to your sites and viewing tasks You can add several sites with their corresponding ISP and subnets in Site. When you apply the changes, the configuration is deployed to the FortiGates, and the SD-WAN network is configured. The status of each configuration within the topology is displayed in the Tasks. FortiGate Cloud 25.2 Administration Guide 41 Fortinet Inc.SD-WANOverlay To apply changes and view tasks: 1. Go to SDWan Overlay > Site. 2. Add the desired sites and their corresponding configuration. See Creating a site on page 43 and Editing a site on page 45 3. Go to SDWan Overlay > Overlay policy. Configure a desired policy. See Creating a policy on page 47. 4. Apply the policy. See Applying policies on page 50. The sync process runs in the background. 5. Go to SDWan Overlay > Tasks icon to view the status of each configuration task. Failed configurations If a configuration in the topology fails, the configuration will appear as red in Tasks. You can review information on the configuration to identify troubleshooting scenarios: l For suggestions on how to successfully connect an asset, select Details. l For information on the configuration, click View Config. You can retry the connection for each asset from Tasks in case the issue has been resolved. To retry a failed connection: 1. Go to SDWan Overlay > Tasks icon to view the status of each configuration task. 2. Identify the failed connection. 3. Click Retry. The Retry Task dialog is displayed. 4. ClickOK. Topology The Topology page displays the current configuration of the SD-WAN overlay hub and site FortiGates. FortiGate Cloud 25.2 Administration Guide 42 Fortinet Inc.SD-WANOverlay Site In the Site page, you can view a table of the sites that have been added. You can also add more sites by clicking Create to enter the New Site dialog. This section includes: l Creating a site on page 43 l Editing a site on page 45 l Deleting sites on page 46 Creating a site You can create a new site from the Site. SD-WAN sites are authorized FortiGate devices. Use SD-WAN overlay to add your FortiGates to the site. You can assign the site as: FortiGate Cloud 25.2 Administration Guide 43 Fortinet Inc.SD-WANOverlay Role Description Branch Organization site that needs to access headquarter applications Data center Organization headquarters that maintain business applications You must set the hub locations before you can add a new site. See Creating the initial topology on page 41. To create a new site: 1. Go to SDWan Overlay > Site. 2. Click Create. 3. Enter the Name. 4. On the Deployment tab, set the site as a Branch or Data Center. 5. (Optional) Enter a Description. 6. Enter the SLA Latency Threshold. 7. Select the FortiGate device to deploy from the Device dropdown menu. It is critical for the added FortiGate device to appear with a status ofOnline. If the device lacks a status ofOnline, check whether the device is: l Powered on. l Activated or logged in to FortiGate Cloud. l Configured and properly connected to its internet service provider’s WAN link. 8. ClickOK. FortiGate Cloud 25.2 Administration Guide 44 Fortinet Inc.SD-WANOverlay Adding HA clusters to sites HA clusters that have been set up outside of FortiGate Cloud can be added to a site when selecting the Device. To implement an HA cluster in FortiGate Cloud, select the primary FortiGate as the Device when adding a site. The secondary FortiGate in the HA cluster will be added to the Device List for Deployment. See High Availability in the FortiOS Administration guide for more information on HA clusters. Editing a site You can edit a site to define the ISP and LAN subnet from the Site page. You can add LAN subnets that will communicate within your SD-WAN region. You can define subnets as either direct or indirect: l direct: Directly select the subnet assigned to a FortiGate interface. l indirect: Use a Classless Inter-Domain Routing (CIDR) prefix to input a network summary address behind the interface. You can create multiple indirect subnets behind the same interface, if needed. To edit a new site: 1. Go to SDWAN Overlay > Site. 2. Select the desired site, then click Edit. 3. Configure how the SD-WAN device connects to the region by selecting the ISP link for external access. a. On the ISP tab, select Create. The Add ISP dialog opens. b. Enter a Name for the ISP. c. Enter the cost assigned to the ISP in the Cost field. d. Select the interface from the Interface dropdown list. e. (Optional) Enter a Description. f. ClickOK. The ISP is added between the hub and site. g. Repeat the above steps to add another ISP configuration. SD-WAN overlay allows a maximum of three ISPs for each site. 4. Select the Subnet tab. Configure the following: a. Select Create. The Add subnet dialog opens. b. Enter a Name. c. Select direct or indirect for the subnet definition. d. Select the interface from the Interface dropdown list. FortiGate Cloud 25.2 Administration Guide 45 Fortinet Inc.SD-WANOverlay e. If you select indirect, configure the CIDR  as needed. f. Enable or disable Advertise to Overlay. g. (Optional) Enter a Description. h. ClickOK. The subnet is added to the topology. 5. ClickOK. Deleting sites You can permanently remove a site FortiGate and connected LAN subnets from the Site page. To delete a site: 1. Go to SDWAN Overlay > Site and identify the site you want to delete. 2. Select Delete. A confirmation message displays. 3. ClickOK. Settings In Settings, you can view the hub locations and the reserved subnet. You can modify settings as needed. SD-WAN overlay uses a reserved subnet to provide IP addresses for the overlay network. Customers should not use this reserved subnet in their networks. By default, SD-WAN overlay has reserved 10.200.0.0/16 for overlay IP addressing of all spokes, and you should not use this network in either the LAN subnets or WAN network. If you have a network conflict, you can modify the reserved subnet in the Settings within FortiGate Cloud. FortiGate Cloud 25.2 Administration Guide 46 Fortinet Inc.SD-WANOverlay To edit settings: 1. Go to SDWANOverlay > Settings. 2. Modify the following settings as desired: Setting Description Primary Hub Locations Modify the primary location using the dropdown menus. Click Save. Secondary Hub Locations Modify the secondary location using the dropdown menus. Click Save. Reserved Subnet Assign a different subnet if you have a network conflict with the default reserved subnet. Click Save. Hub and spoke configurations Push changes to the configuration of the hub and spokes. Confirm in the warning dialog. Overlay policy Centralized SD-WAN overlay policies can be created and managed in the SDWAN Overlay > Overlay Policy page. Overlay policies are policies whose source and destination can be in different sites, crossing overlay networks. For more information on policies, see Policiesin the FortiOS Administration Guide. This section includes: l Creating a policy on page 47 l Viewing policies on page 49 l Applying policies on page 50 l Managing policies on page 50 l Policy example on page 51 Creating a policy You can create new central policies from the SDWan Overlay > Overlay Policy page. FortiGate Cloud 25.2 Administration Guide 47 Fortinet Inc.SD-WANOverlay To create a new policy: 1. Go to SDWan Overlay > Overlay Policy. 2. Click Create. 3. Enter a Name. 4. Define the source: l To define a source address, select Address: i. Select the Site from the dropdown list. ii. Select the Interface from the dropdown list. iii. Select the Address from the dropdown list. You can create a new address in the SDWan Overlay > Addresses page. See Creating an address on page 55. l To define a source address group, select Address Group: i. Select the Address group from the dropdown menu. If there are no address groups listed, you can create a new address group in the SDWan Overlay > Addresses page. See Creating an address group on page 55. 5. Define the destination: l To define a destination address, select Address: i. Select the Site from the dropdown list. ii. Select the Interface from the dropdown list. iii. Select the Address from the dropdown list. You can create a new address in the SDWan Overlay > Addresses page. See Creating an address on page 55. l To define a destination address group, select Address Group: i. Select the Address Group from the dropdown menu. If there are no address groups listed, you can create a new address group in the SDWan Overlay > Addresses page. See Creating an address group on page 55. 6. Select the Service. You can create a new service in the SDWan Overlay > Services page. See Creating a service on page 58. 7. Select the Service Group. FortiGate Cloud 25.2 Administration Guide 48 Fortinet Inc.SD-WANOverlay If there are no service groups listed, you can create a new service group in the SDWan Overlay > Services page. See Creating a service group on page 58. 8. Define the schedule of the policy: l To define the schedule, select Schedule: i. Select the Schedule from the dropdown list. You can create a new schedule in the SDWan Overlay > Schedules page. See Creating a recurring schedule on page 60 and Creating a one-time schedule on page 61. l To define the schedule group, select Schedule Group: i. Select the Schedule Group from the dropdown list. If there are no schedule groups listed, you can create a new schedule group in the SDWan Overlay > Schedules page. See Creating a schedule group on page 61. 9. Set the Action as accept or deny. 10. Select the Security Profiles. Security profiles can be configured in the SDWan Overlay > Security profiles page. See Security profiles on page 64. 11. Define the Logging Options: a. Toggle Log Allowed Traffic and select Security Events or All Sessions to define which events to log. b. EnableGenerate Logs when Session Starts, if needed. 12. (Optional) Enter a description for the policy. 13. Toggle Enable this policy to enable or disable the policy. 14. ClickOK. Once a policy has been created, it will appear in the SDWan Overlay > Overlay policy list with the new status. You must save and apply the policy to the spoke FortiGates before they will take effect. See Applying policies on page 50. Viewing policies Overlay policies are displayed in the in the SDWan Overlay > Overlay Policy page. Policies can be viewed in: l Sequence view: Displays policies in the order that they are checked for matching traffic. The order can be changed by dragging and dropping policies into a new location in the list. FortiGate Cloud 25.2 Administration Guide 49 Fortinet Inc.SD-WANOverlay l Interface pair view: Displays policies in the order by the pairs of incoming and outgoing interfaces in collapsible sections. For more information on Sequence view and Interface pair view, see Policy views in the FortiOS Administration Guide. To filter policies: 1. Go to SDWan Overlay > Overlay policy. 2. In the Search bar, do one of the following: a. Click +, then select the filter criteria from the dropdown list. Select the filter definition from the dropdown list or enter the desired value to filter on. b. Type in the filter definition and value. 3. Configure additional filters as desired. 4. Click Apply. Applying policies The overlay policies must be saved and applied to the spoke FortiGates before they can take effect. Any edits made to a policy will not be pushed to the spokes until they have been applied. To apply a policy: 1. Go to SDWan Overlay > Overlay policy. 2. Right-click the desired policy, then click Save. The Status will change to unapplied. 3. Right-click the policy, then click Apply. The Status will change to synced. Managing policies Policies can be edited and deleted in the SDWan Overlay > Overlay policy page. To edit a policy: 1. Go to SDWan Overlay > Overlay policy. 2. Find the policy you want to update, then select Edit. 3. Make the edits and clickOK. The Status will change tomodified. Right-click the policy, then select Discard Changes to undo any edits made. 4. Right-click the policy, then click Save. The Status will change to unapplied. 5. Right-click the policy, then click Apply. The Status will change to synced. FortiGate Cloud 25.2 Administration Guide 50 Fortinet Inc.SD-WANOverlay To delete a policy: 1. Go to SDWan Overlay > Overlay policy. 2. In Sequence View, select the policy you want to delete. 3. Click Delete. 4. ClickOK in the confirmation dialog. Policy example Given a topology that has already been previously orchestrated using the SDWan Overlay, the following example demonstrates how to create overlay policies between two FortiGate sites in that topology using these steps: 1. Configure an overlay policy to allow traffic from the Datacenter LAN (10.1.100.0/24) to the Branch 1 LAN (10.1.1.0/24). 2. Test and verify connectivity from the Datacenter LAN to the Branch 1 LAN. 3. Test and verify connectivity from the Branch 1 LAN and the Datacenter LAN is not allowed by the overlay policy configured in Step 1. 4. Configure an overlay policy to allow traffic from the Branch 1 LAN (10.1.1.0/24) to the Datacenter LAN (10.1.100.0/24). 5. Test and verify connectivity from the Branch 1 LAN to the Datacenter LAN. For granularity, overlay policies are destined for the source and destination specified only. Therefore, an overlay policy from site A crossing overlay networks to site B does not automatically allow traffic in the opposite direction from site B to site A. You must create a separate overlay policy for traffic in the opposite direction between sites. To configure an overlay policy to allow traffic from the Datacenter LAN to the Branch 1 LAN: 1. Go to SDWan Overlay > Overlay policy. 2. Click Create. 3. Configure the policy as follows: Name DCport3-to-Br1port3 Source Address Site Datacenter Interface port3 10.1.100.0/24 Address port3@Datacenter Destination Address Site Branch-1 Interface port3 10.1.1.0/24 Address port3@Branch-1 Service ALL FortiGate Cloud 25.2 Administration Guide 51 Fortinet Inc.SD-WANOverlay Service Group Schedule/Schedule Group Schedule Schedule always Action accept Security Profiles AntiVirus default Web Filter default Application default Control Intrusion default Prevention Logging Options Log Allowed Enabled, All Sessions Traffic Generate Logs Disabled when Session Starts Description DC port3 to Br1 port3 Enable this policy Enabled 4. ClickOK. 5. In SDWan Overlay > Overlay policy: a. Status is new. Right-click the policy, then click Save. b. Status is unsynced. Right-click the policy, then click Apply. c. Status is synced. The policy has been applied to the FortiGate devices in the specified sites. To test and verify connectivity from the Datacenter LAN to the Branch 1 LAN: 1. Run these CLI commands on the Datacenter FortiGate: # execute ping-options source # execute ping 2. Observe the following output: Datacenter# execute ping-options source 10.1.100.1 Datacenter# execute ping 10.1.1.99 PING 10.1.1.99 (10.1.1.99): 56 data bytes 64 bytes from 10.1.1.99: icmp_seq=0 ttl=255 time=0.7 ms 64 bytes from 10.1.1.99: icmp_seq=1 ttl=255 time=2.7 ms 64 bytes from 10.1.1.99: icmp_seq=2 ttl=255 time=1.2 ms 64 bytes from 10.1.1.99: icmp_seq=3 ttl=255 time=1.9 ms 64 bytes from 10.1.1.99: icmp_seq=4 ttl=255 time=0.6 ms FortiGate Cloud 25.2 Administration Guide 52 Fortinet Inc.SD-WANOverlay --- 10.1.1.99 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 0.6/1.4/2.7 ms To test and verify connectivity from the Branch 1 LAN and the Datacenter LAN is not allowed by the overlay policy: 1. Run these CLI commands on the Branch 1 FortiGate: # execute ping-options source # execute ping 2. Observe the following output: Branch-1# execute ping-options source 10.1.1.99 Branch-1# execute ping 10.1.100.1 PING 10.1.100.1 (10.1.100.1): 56 data bytes --- 10.1.100.1 ping statistics --- 5 packets transmitted, 0 packets received, 100% packet loss To configure an overlay policy to allow traffic from the Branch 1 LAN to the Datacenter LAN: 1. Go to SDWan Overlay > Overlay policy. 2. Configure the policy as follows: Name Br1port3-to-DCport3 Source Address Site Branch-1 Interface port3 10.1.1.0/24 Address port3@Branch-1 Destination Address Site Datacenter Interface port3 10.1.100.0/24 Address port3@Datacenter Service ALL Service Group Schedule/Schedule Group Schedule Schedule always Action accept Logging Options Log Allowed Enabled, All Sessions Traffic FortiGate Cloud 25.2 Administration Guide 53 Fortinet Inc.SD-WANOverlay Generate Logs Disabled when Session Starts Description Enable this policy Enabled 3. ClickOK. 4. In SDWan Overlay > Overlay policy: a. Status is new. Right-click the policy, then click Save. b. Status is unsynced. Right-click the policy, then click Apply. c. Status is synced. The policy has been applied to the FortiGate devices in the specified sites. To test and verify connectivity from the Branch 1 LAN to the Datacenter LAN: 1. Run these CLI commands on the Branch 1 FortiGate: # execute ping-options source # execute ping 2. Observe the following output: Branch-1# execute ping-options source 10.1.1.99 Branch-1# execute ping 10.1.100.1 PING 10.1.100.1 (10.1.100.1): 56 data bytes 64 bytes from 10.1.100.1: icmp_seq=0 ttl=254 time=50.6 ms 64 bytes from 10.1.100.1: icmp_seq=1 ttl=255 time=0.4 ms 64 bytes from 10.1.100.1: icmp_seq=2 ttl=255 time=0.5 ms 64 bytes from 10.1.100.1: icmp_seq=3 ttl=255 time=0.7 ms 64 bytes from 10.1.100.1: icmp_seq=4 ttl=255 time=0.4 ms --- 10.1.100.1 ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 0.4/10.5/50.6 ms Addresses Address objects and groups can be creating and managed in the Addresses pages. The addresses can be used in an overlay policy to identify the source and destination of the traffic flow. For more information about address objects and groups, see Address objectsin the FortiOS Administration Guide. Addresses created in the Addresses > Address page can be added to address groups in the Address Group tab. Subnet addresses will be automatically added to the address list when you add a subnet to your topology. See Creating the initial topology on page 41 and Editing a site on page 45 for more information. This section includes: FortiGate Cloud 25.2 Administration Guide 54 Fortinet Inc.SD-WANOverlay l Creating an address on page 55 l Creating an address group on page 55 l Managing address objects and groups on page 56 Creating an address You can create new addresses to add to overlay policies in the Addresses > Address page. You can implement addresses in an address group. See Creating an address group on page 55. To create a new address: 1. Go to SDWan Overlay > Addresses. 2. Select the Address tab. 3. Click Create. 4. Enter a Name. 5. Select the Type from the dropdown list. 6. Select the Site from the dropdown list. 7. Select the Interface from the dropdown list. 8. If you selected IP Range, enter the IP address range in the IP/Netmask field. 9. (Optional) Enter a Description for the address. 10. ClickOK. Creating an address group You can create a new address group to be used in an overlay policy in the Addresses > Address group page. An address group is a group of address objects that can be used in an overlay policy to identify the source and destination of traffic flow. To create a new address group: 1. Go to SDWan Overlay > Addresses. 2. Select the Address Group tab. 3. Click Create. 4. Enter a Name. 5. In theMembers field, click + to add address objects. 6. In the Select Entries pane, select the desired addresses. See Creating an address on page 55 for how to create an address. 7. (Optional) Enter a Description for the address group. 8. ClickOK. FortiGate Cloud 25.2 Administration Guide 55 Fortinet Inc.SD-WANOverlay Managing address objects and groups You can edit or delete existing addresses and address groups in the Addresses page. To edit an address: 1. Go to SDWan Overlay > Addresses. 2. Select the Address tab. 3. For the address you want to edit, select Edit. 4. Make your updates. 5. ClickOK. To edit an address group: 1. Go to SDWan Overlay > Addresses. 2. Select the Address Group tab. 3. For the address group you want to edit, select Edit. 4. Make your updates. 5. ClickOK. To delete an address: 1. Go to SDWan Overlay > Addresses. 2. Select the Address tab. 3. For the address you want to delete, select Delete. 4. ClickOK in the confirmation dialog. You cannot delete an address if it is being used in an address group. To delete an address group: 1. Go to SDWan Overlay > Addresses. 2. Select the Address Group tab. 3. For the address you want to delete, select Delete. 4. ClickOK in the confirmation dialog. IPAM This feature requires a site to be running FortiOS 7.4.5 and above. Major version 7.6.0 and above is not currently supported. FortiGate Cloud 25.2 Administration Guide 56 Fortinet Inc.SD-WANOverlay IP address management (IPAM) can be configured in the SDWan Overlay > IPAM page. For information on IPAM, see Configure IPAM locally on the FortiGate in the FortiOS Administration Guide. Configuring IPAM New IPAM can be configured in the SDWan Overlay > IPAM page. To configure IPAM: 1. Go to SDWan Overlay > IPAM. 2. Click Create. 3. Enter the Name. 4. Enter the IP/Mask. 5. Enter a Description, if desired. 6. ClickOK. Managing IPAM You can edit and delete existing IPAM instances from the SDWan Overlay > IPAM page. When editing an IPAM instance, you can also reset the IPAM landscape. To edit an IPAM instance: 1. Go to SDWan Overlay > IPAM. 2. Select the desired IPAM instance. 3. Click Edit. 4. Edit the configuration. 5. ClickOK. To delete an IPAM instance: 1. Go to SDWan Overlay > IPAM. 2. Select the desired IPAM instance. 3. Click Delete. A confirmation dialog is displayed. 4. ClickOK. Services Services can be managed from the SDWan Overlay > Services page. See Firewall policy in the FortiOS Administration guide for more information on services. FortiGate Cloud 25.2 Administration Guide 57 Fortinet Inc.SD-WANOverlay Services created in the SDWan Overlay > Services page can be implemented in service groups displayed in the Service group tab. This section includes: l Creating a service on page 58 l Creating a service group on page 58 l Creating a service category on page 59 l Managing services on page 59 Creating a service Service protocols can be created in the SDWan Overlay > Services page. To create a service: 1. Go to SDWan Overlay > Services. 2. Select the Service tab. 3. Click Create. 4. Enter a Name. 5. Select a Category from the dropdown list. Service categories can be created in the Service Category tab. See Creating a service category on page 59. 6. Select a Protocol Type from the dropdown list: 7. Enter the protocol particulars in the new fields. 8. (Optional) Enter a Description of the protocol. 9. ClickOK. Creating a service group Service protocols can be combined into a service group. To create a service group: 1. Go to SDWan Overlay > Services. 2. Select the Service group tab. 3. Click Create. 4. Enter a Name. 5. In the Service Group Members field, click + to add service group members. 6. In the Select Entries pane, select the desired services. 7. (Optional) Enter a Description for the address group. 8. ClickOK. FortiGate Cloud 25.2 Administration Guide 58 Fortinet Inc.SD-WANOverlay Creating a service category You can create new service categories to be used in service protocols. To create a new service category: 1. Go to SDWan Overlay > Services. 2. Select the Service category tab. 3. Click Create. 4. Enter a Name. 5. Enter a description of the service category. 6. ClickOK. Managing services You can edit or delete services, service groups, and service categories in the SDWan Overlay > Services page. To edit a service: 1. Go to SDWan Overlay > Services. 2. Select the Service tab. 3. Find the service you want to edit and select Edit. 4. Make your updates. 5. ClickOK. To edit a service group: 1. Go to SDWan Overlay > Services. 2. Select the Service group tab. 3. Find the service group you want to edit and select Edit. 4. Make your updates. 5. ClickOK. To edit a service category: 1. Go to SDWan Overlay > Services. 2. Select the Service category tab. 3. Find the category you want to edit and select Edit. 4. Make your updates. 5. ClickOK. To delete a service: 1. Go to SDWan Overlay > Services. 2. Select the Service tab. FortiGate Cloud 25.2 Administration Guide 59 Fortinet Inc.SD-WANOverlay 3. Find the service you want to delete and select Delete. 4. ClickOK in the confirmation dialog. You cannot delete a service if it is being used in a service group. To delete a service group: 1. Go to SDWan Overlay > Services. 2. Select the Service group tab. 3. Find the service group you want to delete and select Delete. 4. ClickOK in the confirmation dialog. To delete a service category: 1. Go to SDWan Overlay > Services. 2. Select the Service category tab. 3. Find the category you want to delete and select Delete. 4. ClickOK in the confirmation dialog. You cannot delete a category if it is being used in a service. Schedules Policy schedules can be created and managed in the SDWan Overlay > Schedules page. Schedules can be recurring or one-time occurrences, or a combination in a schedule group. This section includes: l Creating a recurring schedule on page 60 l Creating a one-time schedule on page 61 l Creating a schedule group on page 61 l Managing schedules on page 62 Creating a recurring schedule You can create a policy schedule that recurs at specific days and times in the SDWan Overlay > Schedules page. This schedule will continue to recur in the assigned policy until it is removed or edited. FortiGate Cloud 25.2 Administration Guide 60 Fortinet Inc.SD-WANOverlay To create a recurring schedule: 1. Go to SDWan Overlay > Schedules. 2. Select the Recurring schedule tab. 3. Click Create. 4. Enter a Name. 5. Specify the Days: l Select All days if the schedule should occurs every day of the week. l Select Specify to select specific days of the week for the schedule to occur. 6. Specify the Time: l Select All day if the schedule should occurs for 24 hours. l Select Specify to set a Start and Stop time. 7. ClickOK. Creating a one-time schedule You can create a one-time schedule event in the SDWan Overlay > Schedules page. To create a one-time schedule: 1. Go to SDWan Overlay > Schedules. 2. Select theOne-Time schedule tab. 3. Click Create. 4. Enter a Name. 5. Specify the Start Date and time. 6. Specify the End Date and time. 7. If you would like an event log to occur before the expiration of the schedule, enable Pre-expiration event log and specify the Number of days before expiration. 8. ClickOK. Creating a schedule group You can create a schedule group from a combination of recurring and one-time schedules in the SDWan Overlay > Schedules page. To create a schedule group: 1. Go to SDWan Overlay > Schedules. 2. Select the Schedule group tab. 3. Click Create. 4. Enter a Name. FortiGate Cloud 25.2 Administration Guide 61 Fortinet Inc.SD-WANOverlay 5. In the Schedule Group Members field, click + to select the desired schedules from the Select Entries pane. For information on creating schedules that can be added to an schedule group, see Creating a recurring schedule on page 60 and Creating a one-time schedule on page 61. 6. ClickOK. Managing schedules You can edit and delete schedules and schedule groups from the SDWan Overlay > Schedules page. To edit a recurring schedule: 1. Go to SDWan Overlay > Schedules. 2. Select the Recurring schedule tab. 3. Find the schedule you want to edit and select Edit. 4. Make your updates. 5. ClickOK. To edit a one-time schedule: 1. Go to SDWan Overlay > Schedules. 2. Select theOne-Time schedule tab. 3. Find the schedule you want to edit and select Edit. 4. Make your updates. 5. ClickOK. To edit a schedule group: 1. Go to SDWan Overlay > Schedules. 2. Select the Schedule group tab. 3. Find the schedule group you want to edit and select Edit. 4. Make your updates. 5. ClickOK. To delete a recurring schedule: 1. Go to SDWan Overlay > Schedules. 2. Select the Recurring schedule tab. 3. Find the schedule you want to delete and select Delete. 4. ClickOK in the confirmation dialog. You cannot delete a schedule if it is being used in a schedule group. FortiGate Cloud 25.2 Administration Guide 62 Fortinet Inc.SD-WANOverlay To delete a one-time schedule: 1. Go to SDWan Overlay > Schedules. 2. Select theOne-Time schedule tab. 3. Find the schedule you want to delete and select Delete. 4. ClickOK in the confirmation dialog. You cannot delete a schedule if it is being used in a schedule group. To delete a schedule group: 1. Go to SDWan Overlay > Schedules. 2. Select the Schedule group tab. 3. Find the schedule group you want to delete and select Delete. 4. ClickOK in the confirmation dialog. IP Pools IP pools are a mechanism that allows sessions leaving the FortiGate firewall to use NAT. IP pools can be configured in the SDWan Overlay > IP Pools page. For more information on IP pools, see Static SNAT, Dynamic SNAT, and Central SNAT in the FortiOS Administration Guide. Once an IP pool is configured, it can be implemented when configuring overlay policies to be applied to the FortiGate devices. See Creating a policy on page 47. This feature requires a site to be running FortiOS 7.4.5 and above. Major version 7.6.0 and above is not currently supported. This section includes: l Creating an IP pool on page 63 l Managing IP pools on page 64 Creating an IP pool You can create a new IP pool in the SDWan Overlay > IP Pools page. FortiGate Cloud 25.2 Administration Guide 63 Fortinet Inc.SD-WANOverlay To create an IP pool: 1. Go to SDWan Overlay > IP Pools. 2. Click Create. 3. Enter the Name. 4. Enter a Description, if desired. 5. Select the Type. 6. Enter the IP address and range information as needed. The IP address and range field differ depending on the selected Type. For more information on each Type, see Dynamic SNAT in the FortiOS Administration Guide. 7. Enable or disabled ARP Reply. 8. ClickOK. Managing IP pools You can edit or delete existing IP pools in the SDWan Overlay > IP Pools page. To edit an IP pool: 1. Go to SDWan Overlay > IP Pools. 2. Select the desired IP pool. 3. Click Edit. 4. Edit the fields as desired. 5. ClickOK. To delete an IP pool: 1. Go to SDWan Overlay > IP Pools. 2. Select the desired IP pool. 3. Click Delete. A confirmation dialog is displayed. 4. ClickOK. Security profiles Security profiles configurations can be managed from SDWan Overlay > Security profiles. See Security Profiles in the FortiOS Administration Gudide for more information. Sites must be running FortiOS 7.6.0 or later to support security profiles. See Prerequisites on page 40. FortiGate Cloud 25.2 Administration Guide 64 Fortinet Inc.SD-WANOverlay The security profiles available include: l AntiVirus on page 65 l Web Filter on page 66 l Application Control on page 66 l Intrusion Prevention on page 67 l Application signatures on page 68 l IPS signatures on page 68 AntiVirus Antivirus security profiles can be created and managed from SDWan Overlay > Security profiles > AntiVirus tab. See Antivirus in the FortiOS Administration Guide for more information. To create an antivirus security profile: 1. Go to the SDWan Overlay > Security profiles > AntiVirus tab. 2. Click Create. The New AntiVirus Profile page is displayed. 3. Enter the Name. 4. Enter a Description. 5. Enable AntiVirus scan. This feature cannot be enabled until the security profile is inspecting at least one protocol. 6. Enable the desired Inspected Protocols. An error is displayed until the scan options are defined in the next step. 7. Enable the desired APT Protection Options. 8. Enable the desired Virus Outbreak Prevention fields. 9. ClickOK. To edit a security profile: 1. Go to the SDWan Overlay > Security profiles > AntiVirus tab. 2. Select the desired profile. 3. Click Edit. 4. Edit the security profile as desired. 5. ClickOK. To delete a security profile: 1. Go to the SDWan Overlay > Security profiles > AntiVirus tab. 2. Select the desired profile. 3. Click Delete. A confirmation dialog is displayed. 4. ClickOK. FortiGate Cloud 25.2 Administration Guide 65 Fortinet Inc.SD-WANOverlay Web Filter Web filter security profiles can be created and managed from SDWan Overlay > Security profiles > Web filter tab. See Web filter in the FortiOS Administration Guide for more information. To create a new web filter security profile: 1. Go to the SDWan Overlay > Security profiles > Web filter tab. 2. Click Create. The NewWeb Filter Profile page is displayed. 3. Enter the Name. 4. Enter a Description. 5. Enable the FortiGuard Category Based Filter and configure the filters. See FortiGuard filter in the FortiOS Administration Guide. To configure non-default actions for certain categories, select the category, then select the desired action. 6. Enable and configure the desired Search Engines parameters. See Search engines in the FortiOS Administration Guide. 7. Enable and configure the desired Static URL Filter parameters. See Static URL filter in the FortiOS Administration Guide. The URL Filter and Content Filter features require a site to be running FortiOS 7.4.6 and above. Major version 7.6.0 and above is not currently supported. 8. Enable the desired Rating Options. 9. ClickOK. To edit a security profile: 1. Go to the SDWan Overlay > Security profiles > Web filter tab. 2. Select the desired profile. 3. Click Edit. 4. Edit the security profile as desired. 5. ClickOK. To delete a security profile: 1. Go to the SDWan Overlay > Security profiles > Web filter tab. 2. Select the desired profile. 3. Click Delete. A confirmation dialog is displayed. 4. ClickOK. Application Control Application control sensors can be created and managed from SDWan Overlay > Security profiles > Application Control tab. See Application control in the FortiOS Administration Guide for more information. FortiGate Cloud 25.2 Administration Guide 66 Fortinet Inc.SD-WANOverlay To create a new application control sensor: 1. Go to the SDWan Overlay > Security profiles > Application Control tab. 2. Click Create. The New Application Sensor page is displayed. 3. Enter the Name. 4. Enter a Description. 5. Edit the Categories as desired. 6. Enable Network Protocol Enforcement. a. Click Create. b. Configure the network service. c. ClickOK. 7. Click Create for Application Overrides. See Basic category filters and overrides in the FortiOS Administration Guide. a. Configure the override. Application signatures can also be viewed in the Policy > Security Profiles > Application Signatures tab. See Application signatures on page 68. b. ClickOK. 8. Enable the desiredOptions. 9. ClickOK. To edit a sensor: 1. Go to the SDWan Overlay > Security profiles > Application Control tab. 2. Select the desired sensor. 3. Click Edit. 4. Edit the sensor as desired. 5. ClickOK. To delete a sensor: 1. Go to the SDWan Overlay > Security profiles > Application Control tab. 2. Select the desired sensor. 3. Click Delete. A confirmation dialog is displayed. 4. ClickOK. Intrusion Prevention Intrusion prevention security profiles can be created and managed from SDWan Overlay > Security profiles > Intrusion prevention tab. See Intrusion prevention in the FortiOS Administration Guide for more information. FortiGate Cloud 25.2 Administration Guide 67 Fortinet Inc.SD-WANOverlay To create a new IPS sensor: 1. Go to the SDWan Overlay > Security profiles > Intrusion prevention tab. 2. Click Create. The New IPS Sensor page is displayed. 3. Enter the Name. 4. Enter a Description. 5. Enable Block malicious URLs. 6. Click Create for IPS Signatures and Filters. a. Select the Type. b. Configure the filter or signature as required. IPS signatures are also listed in the SDWan Overlay > Security profiles > IPS signatures tab. See IPS signatures on page 68. c. ClickOK. 7. Configure the Botnet C&C as desired. 8. ClickOK. To edit a sensor: 1. Go to the Policy > Security Profiles > Intrusion Prevention tab. 2. Select the desired sensor. 3. Click Edit. 4. Edit the security profile as desired. 5. ClickOK. To delete a sensor: 1. Go to the SDWan Overlay > Security profiles > Intrusion Prevention tab. 2. Select the desired sensor. 3. Click Delete. A confirmation dialog is displayed. 4. ClickOK. Application signatures Application signatures can be viewed in the SDWan Overlay > Security profiles > Application signatures tab. Application signatures are required when configuring overrides in application control profiles. See Application Control on page 66. IPS signatures IPS signatures can be viewed in the SDWan Overlay > Security profiles > IPS signatures tab. IPS signatures are required when configuring signatures in IPS sensors. See IPS signatures on page 68. FortiGate Cloud 25.2 Administration Guide 68 Fortinet Inc.Configuration In Configuration > Revisions, you can manage FortiGate revisions. This feature is only available for FortiGates with a subscription. For a FortiGate with a subscription, Configuration > Revisions displays the number of revisions and last backup time. You can click a FortiGate, then clickManage revisions to view detailed revision history for that FortiGate. To back up a configuration: 1. Go to Configuration > Revisions. 2. Click the desired FortiGate. 3. ClickManage revisions. 4. Click Backup config. FortiGate Cloud grays out this button if the current configuration on the FortiGate is already backed up. To schedule an automatic backup: 1. Go to Configuration > Revisions. 2. Click the desired FortiGate. 3. ClickManage revisions. 4. Click Schedule auto-backup. 5. If automatic backup is disabled, click Enable. 6. For Backup interval, select Session, Daily, orWeekly. 7. (Optional) If you selected a daily or weekly interval, you can enable Backup when config change. If no configuration changed, FortiGate Cloud does not perform the daily or weekly backup. 8. (Optional) Enable Backup mail notification, and enter the desired email addresses to receive the notification. From theMail notification language dropdown list, select the desired language of the email. 9. ClickOK. To compare revisions: 1. Go to Configuration > Revisions. 2. Click the desired FortiGate. 3. ClickManage revisions. 4. Select two revisions. 5. Click Compare. The Revision comparison panel shows the configuration differences between the two revisions. 6. Click Close. To restore the device to a previous configuration: 1. Go to Configuration > Revisions. 2. Click the desired FortiGate. 3. ClickManage revisions. 4. Select a backup. FortiGate Cloud 25.2 Administration Guide 69 Fortinet Inc.Configuration 5. Click Actions > Restore. 6. ClickOK. Your device reverts to the configuration revision of the selected backup. FortiGate Cloud 25.2 Administration Guide 70 Fortinet Inc.CLI scripts When you run a function in FortiGate Cloud that applies to FortiGates, such as running a script, FortiGate Cloud does not pass the actual username of the user who performed the action to FortiOS: For remotely accessing a FortiGate from FortiGate Cloud, FortiGate Cloud passes the username of the FortiGate Cloud user who performed the action as a randomized @fortigatecloud.com email address, such as 4aa567e55bc8@fortigatecloud.com, to FortiOS. For other management features that a user can perform from FortiGate Cloud, such as running a script, FortiGate Cloud passes the username of the FortiGate Cloud user who performed the action as FortiGateCloud to FortiOS. Therefore, when viewing logs on the affected FortiGate, you may see 4aa567e55bc8@fortigatecloud.com or FortiGateCloud as a username. For managed security service provider customers, this provides enhanced security by preventing subusers from seeing the primary account email address in the FortiGate logs. You can configure and schedule scripts of CLI commands to run on your FortiGates. For FortiOS CLI command information, see the FortiOS CLI Reference. To create a script: 1. Go to CLI scripts > Script list. 2. Click Create new. 3. In the CLI script field, enter the desired FortiOS CLI commands to run on the FortiGates. 4. Configure other fields as desired, then clickOK. To run a script: 1. Go to CLI scripts > Script list. Select the desired script, then click Run. 2. In FortiGates, select the desired FortiGates. 3. In the Execution schedule toggle, select one of the following: l To run the script immediately, click Immediate. l To schedule the script to run at a desired time, select Scheduled. Configure the desired time to run the script. ClickOK. You can view and edit scheduled script runs in CLI Scripts > Script tasks > Scheduled scripts. You can view the script run results in CLI scripts > Script tasks > Run results. FortiGate Cloud 25.2 Administration Guide 71 Fortinet Inc.Administration In Administration, you can access Automation, Firmware management, and User settings. Automation In Automation, you can enable trigger-based automation for alerts and receive notifications. To configure an event handler stitch: 1. Go to Administration > Automation. 2. On the Actions tab, click Create new. 3. Enable Email. 4. Configure the desired email addresses to send the notification from and to. 5. Configure other fields as desired, then clickOK. 6. On the Stitches tab, click Create new. 7. Click Add trigger. From the Select Entries pane, select the desired event to send notifications for. 8. Click Add action. From the Select Entries pane, select the desired action to take. 9. ClickOK. When the trigger occurs, FortiGate Cloud takes the configured action and sends notifications as configured. To enable or disable a notification email for a configured event handler stitch: 1. Go to Administration Automation > Stitches tab. 2. Right-click the desired automation stitch to disable notification emails for. 3. On the tooltip menu, click Enable or Disable. To configure the Sandbox event handler stitch: 1. Go to Administration > Automation. 2. On the Actions tab, click Create new. 3. Configure the desired email addresses to send the notification from and to. 4. Configure other fields as desired, then clickOK. 5. On the Stitches tab, edit the Sandbox stitch. 6. To configure email notifications, do the following: a. Enable Email alert. b. Configure the desired email addresses to send the notification from and to. 7. Under Triggers, enable the desired file types to send notifications for. 8. ClickOK. When the trigger occurs, FortiGate Cloud takes the configured action and sends notifications as configured. FortiGate Cloud 25.2 Administration Guide 72 Fortinet Inc.Administration Firmware management In 25.2, firmware profiles are only available for devices with a paid subscription. Firmware management lists FortiGates deployed to FortiGate Cloud and groups FortiGates that belong to the same Fortinet Security Fabric. You can manage firmware upgrades in the Firmware upgrade tab. Firmware profiles allow you to easily control device firmware for multiple FortiGates with a subscription from one central interface and automate firmware upgrades. FortiGates set to automatic patch upgrade perform firmware upgrades to the latest patch of the same major minor release version during the selected time. When a new FortiOS patch becomes available, FortiGate Cloud sends an email to notify the user that they must upgrade the firmware within seven days of the release date of the patch for FortiGates running an older patch of that FortiOS version. For a FortiGate with a paid subscription, you can postpone the upgrade if desired. For a FortiGate without a paid subscription, if you do not upgrade it within seven days, it remains connected to FortiGate Cloud but cannot use any FortiGate Cloud features. It stops uploading logs to FortiGate Cloud. If a FortiGate without a paid subscription is not running the latest patch available of its FortiOS version when it initially connects to FortiGate Cloud, you must also upgrade it within seven days of the release date of the latest patch. If the latest patch was released more than seven days earlier, you must upgrade the FortiGate immediately. The FortiGate cannot use FortiGate Cloud features and does not upload logs to FortiGate Cloud until it is upgraded. FortiGate Cloud 25.2 Administration Guide 73 Fortinet Inc.Administration If the FortiOS version on a FortiGate reaches end of support (EOS), you must upgrade the FortiGate to the latest patch of a supported major release. Updating to the latest patch is not required for the following devices: l FortiGate that is a member of one of the following: l High availability cluster l Cooperative Security Fabric l FortiGate that is running a special build (if the build number is greater than or equal to 8000) To schedule a firmware upgrade: 1. Go to Administration > Firmware management > Firmware upgrade. 2. Select the desired FortiGates. 3. Click Fabric upgrade. 4. For Upgrade schedule, select Immediate or Custom. If you select Custom, configure the desired upgrade time. 5. Confirm that the dialog displays the desired firmware versions for each FortiGate. ClickOK. FortiGate Cloud backs up the FortiGate configurations and upgrades the firmware as per the schedule that you configured. The upgrade reboots the FortiGates. To upgrade EOS firmware: 1. Go to Administration > Firmware management > Firmware upgrade. 2. Select the desired FortiGates. 3. Click Upgrade EOS firmware. If the firmware is at EOS, this upgrades it to a supported version. To create a firmware profile: 1. Go to Administration > Firmware management > Firmware profiles. 2. Click Create. FortiGate Cloud 25.2 Administration Guide 74 Fortinet Inc.Administration 3. In the Create firmware profile slide-in, configure firmware profile settings. 4. ClickOK to create firmware profile. You can assign firmware profiles in Asset list. See Assets on page 22. Accounts and users FortiGate Cloud supports the unified FortiCloud account for login to access the portal. The user who created the account, which this guide refers to as the primary user, can log in to FortiGate Cloud using their email ID as the username and the password that they chose when creating the account. FortiGate Cloud 25.2 Administration Guide 75 Fortinet Inc.Administration Creating an account You can register a new FortiCloud account using the Create account button on the landing page. User management The primary user can add users to the account using the following methods: User type Method Identity and Access Management Add users to the FortiCloud account with role-based access control in FortiGate (IAM) user Cloud using the FortiCloud IAM service. See IAM users on page 76. FortiGate Cloud does not support subusers added via the FortiCare legacy user management system. IAM users are the recommended approach. IAM users FortiCloud Identity & Access Management (IAM) supports creating IAM users and allowing access to FortiGate Cloud using resource-based access control using FortiCloud permission profiles. When creating a permission profile in the IAM portal, you must add the FortiGate Cloud portal to the profile and configure the desired permissions. FortiGate Cloud 25.2 Administration Guide 76 Fortinet Inc.Administration For details on creating a permission profile in the IAM portal, see Creating a permission profile. See Adding IAM users for details on configuring IAM users. FortiCloud organizations FortiGate Cloud supports organizational unit (OU) account selection and switching. See Organization Portal for details on creating an OU. Creating an IAM user with OU scope See User permissions. User settings You can add and manage users from Administration > User settings. User settings includes different user types, including Identity & Access Management (IAM) and FortiGate Cloud account users. User settings displays a key icon beside the primary account. User settings displays a Legacy Portal toggle that you can use to revert to the legacy portal. The User settings page contains the following columns: FortiGate Cloud 25.2 Administration Guide 77 Fortinet Inc.Administration Column Description Login ID Email address that the user uses to log in to the FortiGate Cloud. This column also displays the region that each user can access and their role. Role Displays the user role. User Type Displays the type of user. User types include the following: l IAM: see IAM users on page 76. l API: an API user only has the ability to call the FortiGate Cloud API. FortiCare manages API users and their access permissions. API users are subusers of the primary account. See API access on page 86. l Third Party: user who authenticates using an external identity provider (IdP). Configuring an external IdP requires FortiCare and FortiAuthenticator support. Aliases Name of the user associated with the user account. You may want to edit a username to make it easier to identify who is using that account. You can edit the username by clicking the Edit icon in the Action column. Status Status of the user account. The status can be one of the following: l Active: user who has activated their account. l Inactive: user to whom an activation email has been sent, but has not activated their account yet. For IAM and IdP users, they can only view their own account and edit their language settings on this page. FortiGate Cloud 25.2 Administration Guide 78 Fortinet Inc.Audit Audit > Activities displays a log of actions that users have performed on FortiGate Cloud. You can filter the page to only view logs for actions for a certain date range, module, or action type. The log displays information for the following modules: Module Actions Account Account activities Backup l Backing up a device configuration l Downloading and disabling backups Cloud access Viewing and configuring a device via cloud access Device deployment l Deploying and undeploying devices l Deleting deployments Log Exporting logs Report Downloading, scheduling, and running reports Sandbox Uploading files to Sandbox for analysis Script Creating, editing, deleting, and deploying scripts Upgrade Scheduling and running upgrades The following information is available for each action. You can configure which columns display: l Time when the action occurred l User who completed the action l Module that the action falls under l Action type l Subject that the action was performed on l Other details as available FortiGate Cloud 25.2 Administration Guide 79 Fortinet Inc.Multitenancy FortiGate Cloud supports FortiCloud Organizations for seamless multitenant features designed for managed security service providers across multiple FortiCloud accounts. With Organizations, Identity & Access Management (IAM) users can view an organizational unit (OU) Dashboard for a single pane of glass view of assets across the entire Organization or OU. Administrators can add additional users with a fine grained permission model (IAM permission profile) and manage the visibility and access to full Organization or specific OU or OUmember accounts. You can create an Organization and manage up to 10 accounts. For managing more than 10 accounts, Organization root account can create a Fortinet Developer Network basic account. This requires no additional license. See the following for details on various OU tasks: Task Instructions Creating an OU Adding and deleting OUs Creating an OU IAM user Organization user management When creating a permission profile in the IAM portal, you must add the FortiGate Cloud portal to the profile, and configure the desired permissions. See IAM users on page 76. Log in as an OU IAM user Logging into an OU account When you log in to FortiGate Cloud, if OUs are enabled on the account, a OU/account selection screen displays. You can select an OU or account to access from this tree. The folder icon denotes OUs, while the file icon denotes accounts. FortiGate Cloud 25.2 Administration Guide 80 Fortinet Inc.Multitenancy To move to another OU or account, select the desired OU from the dropdown list in the upper right corner. OU Dashboard The OU Dashboard provides a consolidated view of accounts and assets in the given scope of the Organization. The dashboard is available for Organization type IAM users and the visibility of accounts and assets depends on the OU scope selected for the IAM user. When you access an OU from the OU tree, FortiGate Cloud displays an OU dashboard. The following lists OU dashboard widgets: FortiGate Cloud 25.2 Administration Guide 81 Fortinet Inc.Multitenancy Widget Displays a donut chart that details... Devices Device type breakdown and total number of devices in this OU. Accounts Total number of accounts in this OU. Management connectivity Management connectivity status breakdown and total number of devices in this OU. FortiGate subscriptions FortiGate Cloud subscription type breakdown and total number of devices in this OU. Sandbox subscriptions Sandbox subscription type and total number of devices in this OU. Firmware Firmware version installed on devices in this OU. CPU usage CPU usage levels on devices in this OU. Memory usage Memory usage levels on devices in this OU. When logged in to an OU, you can also access the Assets, Analytics, Administration, Configuration, CLI scripts, and Audit pages. The OU Assets page offers some functionalities that the account-level Assets page does not. See OU Asset list on page 83. For the remaining pages, they offer the same functionality as their account-level equivalent pages do. The OU-level pages allow you to view and configure settings for each account in the OU by using the account navigation pane. For descriptions of the functionalities, see the topics for the account-level page in this guide, such as Analytics on page 32. FortiGate Cloud 25.2 Administration Guide 82 Fortinet Inc.Multitenancy OU Asset list The OU Asset list displays the list of devices for each account in the organizational unit (OU). You can view device information for different OUs and accounts by using the navigation pane. The device list is separated into FortiGates that have a FortiGate Cloud subscription and FortiGates without a subscription. You can also manage firmware upgrades for FortiGates across the OU. The Firmware column also warns of potential critical vulnerabilities associated with your FortiGates'' firmware versions. You can export the OU asset list and its data using Export to CSV. This list displays the following information about the devices: Column Description Account ID FortiCloud account that the device is registered to. Device name Device name and serial number. Firmware Firmware version installed on the device. Upgrade status Displays if the FortiGate is currently performing a firmware upgrade. Transfer status Transfer status on the device. CPU usage CPU usage level on the device. Memory usage Memory usage level on the device. Claimed on (Optional, non-default) Date the device was claimed. Deployment key (Optional, non-default) Key used to deploy device. Last backup (Optional, non-default) Date and time of last configuration backup on the device. Last log upload (Optional, non-default) Date and time of last log uploaded by device. Name (Optional, non-default) Device name. Serial (Optional, non-default) Serial number. FortiGate Cloud 25.2 Administration Guide 83 Fortinet Inc.Multitenancy Column Description Subscription (Optional, non-default) Subscription status of the device. You can import and provision FortiGates using OUs. To import and provision a FortiGate: 1. Go to Assets > Asset list in the OU view. 2. Select the account to add a FortiGate to by using the OU tree. 3. Click Add FortiGate. 4. On the Inventory slide, click Import FortiGate. 5. Enter a FortiCloud or FortiDeploy key(s), select a partner, and clickOK. 6. Select the devices to provision on the Inventory slide and click Provision. The provisioned devices now are on the OU Asset list. You can transfer FortiGates between accounts in an OU. To transfer a FortiGate: 1. Go to Assets > Asset list in the OU view. 2. Select the account with the source FortiGate(s) you would like the transfer by using the OU tree. 3. Select the source FortiGate(s) on the table. 4. Click the Transfer FortiGates button. FortiGate Cloud 25.2 Administration Guide 84 Fortinet Inc.Multitenancy 5. On the Transfer FortiGates slide, select the destination account, data transfer option, click the acknowledgment, then clickOK. The selected FortiGate(s) will now be transferred to from the source account to the destination account. FortiGate Cloud supports transfers from and to the and legacy FortiGate Cloud portal. FortiGate Cloud 25.2 Administration Guide 85 Fortinet Inc.API access The following provides instructions on how to access and call the FortiGate Cloud API. You can find all supported API calls at the FortiGate Cloud REST API documentation. FortiOS 7.0 and later versions return Gzipped binary file responses by default. For CURL, you can add the - - compressed tag in your query to get the unzipped plain response. For FortiGate Cloud API calls, the host address depends on the server environment as follows: Environment Host address Global api.fortigate.forticloud.com Europe euapi.fortigate.forticloud.com Japan jpapi.fortigate.forticloud.com All API calls that this guide includes use the global environment as an example. To make an API call using a server authentication token: 1. Call the token retrieval API. The following provides an example: Request: curl -H "Content-Type: application/json" -X POST -d '' {"accountId":"xxx","userName":"xxx","password":"xxxxxxxx"}'' https://www.forticloud.com/forticloudapi/v1/auth Response: {"access_token": "EXAMPLETOKEN", "expires_in": 14400, "message": "successfully authenticated", "refresh_token": "syIsrAofcHe67bTFdmhhT5pInnqCXT", "scope": "read write", "status": "success", "token_type": "Bearer"} Substitute in your FortiGate Cloud account credentials and host address. 2. You can query all supported FortiGate Cloud APIs using the access token that you retrieved from step 1. The following provides an example: Request: curl -H "Content-Type: application/json" -H "Authorization: Bearer EXAMPLETOKEN" -X GET https://www.forticloud.com/forticloudapi/v1/devices Response: [{"sn":"","name":"FortiGate-100D","timeZone":- 7.0,"tunnelAlive":true,"contractEndTime":0,"model":"FortiGate 100D","firmwareVersion":"6.2.8","management":false,"initialized":false,"subAccountO id":793,"ip":"172.16.30.193","latitude":null,"longitude":null,"total":8,"trial":fal se},{"sn":"FG60DP4614004455","name":"FG60DP4614004455-Daniel-FGT","timeZone":- 7.0,"tunnelAlive":false,"contractEndTime":0,"model":"FortiGate","firmwareVersion":" 6.0.9","management":true,"initialized":false,"subAccountOid":- 1,"ip":"172.16.93.119","latitude":null,"longitude":null,"total":8,"trial":true}, {"sn":"FGT60ETK1809A1GX","name":"FGT60ETK1809A1GX","timeZone":- 8.0,"tunnelAlive":false,"contractEndTime":0,"model":"FortiGate","firmwareVersion ... FortiGate Cloud 25.2 Administration Guide 86 Fortinet Inc.API access To make an API call using an IAM user authentication token: 1. If you do not already have one, create an Identity & Access Management (IAM) API user: a. Log in to the IAM portal using your FortiGate Cloud account credentials. b. Go to API Users, then click ADD API USER. Click Next. c. Under Effective Portal Permissions, select FortiGate, then ADD. Click Next. d. Click Edit. Toggle Allow Portal Access to YES. Under Access Type, select Admin. Click CONFIRM. e. Click DOWNLOAD CREDENTIALS. Open the downloaded file to view your username and password. 2. Retrieve the access token by calling the FortiAuthenticator token retrieval API: /oauth/token/. The following provides an example where the FortiAuthenticator IP address is customerapiauth.fortinet.com: Request: curl -H "Content-Type: application/json" -X POST -d https://customerapiauth.fortinet.com/api/v1/oauth/token/ ''{"username":"AC0F1454- 3CCD-4523-8B3C- 4412156CB197","password":"a679bc11d6011e6ea3a7390cef0cd66b!1Aa","client_ id":"fortigatecloud","grant_type":"password"}'' Response: {"access_token": "EXAMPLETOKEN", "expires_in": 14400, "message": "successfully authenticated", "refresh_token": "syIsrAofcHe67bTFdmhhT5pInnqCXT", "scope": "read write", "status": "success", "token_type": "Bearer"} 3. You can query all supported FortiGate Cloud APIs using the access token that you retrieved from step 2. The following provides an example: Request: curl -H "Content-Type: application/json" -H "Authorization: Bearer EXAMPLETOKEN" -X GET https://www.forticloud.com/forticloudapi/v1/devices -k Response: [{"sn":"FG100D3G15803161","name":"FortiGate-100D","timeZone":- 7.0,"tunnelAlive":true,"contractEndTime":0,"model":"FortiGate 100D","firmwareVersion":"6.2.8","management":false,"initialized":false,"subAccountO id":793,"ip":"172.16.30.193","latitude":null,"longitude":null,"total":8,"trial":fal se},{"sn":"FG60DP4614004455","name":"FG60DP4614004455-Daniel-FGT","timeZone":- 7.0,"tunnelAlive":false,"contractEndTime":0,"model":"FortiGate","firmwareVersion":" 6.0.9","management":true,"initialized":false,"subAccountOid":- 1,"ip":"172.16.93.119","latitude":null,"longitude":null,"total":8,"trial":true}, {"sn":"FGT60ETK1809A1GX","name":"FGT60ETK1809A1GX","timeZone":- 8.0,"tunnelAlive":false,"contractEndTime":0,"model":"FortiGate","firmwareVersion ... To call FortiOS APIs via FortiGate Cloud: You can proxy any FortiOS API via FortiGate Cloud. The format for calling FortiOS APIs from FortiGate Cloud is as follows: https://www.forticloud.com/forticloudapi/v1/fgt// The following provides an example request where the FortiGate serial number is FGT60D461xxxxxxx and the API being called is /api/v2/monitor/fortiguard/service-communication-stats, which retrieves historical statistics for communication with FortiGuard services. Request: curl -H "Content-Type: application/json" -H "Authorization: Bearer EXAMPLETOKEN" https://www.forticloud.com/forticloudapi/v1/fgt/FGT60D461xxxxxxx/api/v2/monitor/fortig uard/service-communication-stats For FortiOS API information, see the FortiOS REST API documentation. FortiGate Cloud 25.2 Administration Guide 87 Fortinet Inc.Frequently asked questions What do I do if FortiOS returns an Invalid Username or Password/FortiCloud Internal Error/HTTP 400 error when activating FortiGate Cloud on the FortiOS GUI? 1. Ensure that you can log into FortiGate Cloud via a web browser using the same username and password that you attempted to activate FortiGate Cloud with on the FortiOS GUI. 2. Confirm that the FortiGate can ping logctrl1.fortinet.com or globallogctrl.fortinet.net. 3. Connect via Telnet to the resolved IP address from step 2 using port 443. 4. Ensure that the FortiGate Cloud account password length is fewer than 20 characters. 5. If running FortiOS 5.4 or older versions, ensure that the FortiGate Cloud account password does not include special characters, as these FortiOS versions do not support this. 6. If the FortiGate is a member of a high availability (HA) pair, ensure that you activate FortiGate Cloud on the primary device. Activate FortiGate Cloud on the primary FortiGate as To provision a FortiGate or FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 25 describes. FortiGate Cloud activation on the primary FortiGate activates FortiGate Cloud on the secondary FortiGate. Local FortiGate Cloud activation on the secondary FortiGate will fail. 7. Enable FortiGate Cloud debugging in the CLI. The get command displays the device timezone, while the diagnose debug console timestamp enable command shows the date timestamp for the debug logs. config system global get end diagnose debug console timestamp enable execute fortiguard-log domain diagnose debug application forticldd -1 diagnose debug enable execute fortiguard-log login email password Email any debug output to admin@forticloud.com. 8. If you see the HTTP 400 error, enable HTTP debug with the diagnose debug application httpsd -1 command. FortiGate Cloud 25.2 Administration Guide 88 Fortinet Inc.Frequently asked questions Why can I log into the FortiGate Cloud but not activate the FortiGate Cloud account in FortiOS with the same credentials? FortiOS 5.4 and older versions do not support passwords with special characters. If you are running FortiOS 5.4 or an older version and attempting to activate a FortiGate Cloud account with a password that includes special characters, the activation fails. You must remove special characters from the password, or upgrade to FortiOS 5.6 or a later version. How can I activate my FortiGate Cloud on HA- paired FortiGates? Activate FortiGate Cloud on the primary FortiGate as To provision a FortiGate or FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 25 describes. FortiGate Cloud activation on the primary FortiGate activates FortiGate Cloud on the secondary FortiGate. Local FortiGate Cloud activation on the secondary FortiGate will fail. You can also disable HA on both devices, activate FortiGate Cloud on each device, then enable HA. How can I establish a management tunnel connection between my FortiGate and FortiGate Cloud? Do one of the following: l If you have not activated FortiGate Cloud in FortiOS for the first time, follow the steps in FortiCare and FortiGate Cloud login. l Otherwise, if you have already activated FortiGate Cloud, run the following commands in FortiOS to establish a connection manually: config system central-management set type fortiguard end diagnose fdsm contract-controller-update fnsysctl killall fgfmd FortiGate Cloud 25.2 Administration Guide 89 Fortinet Inc.Frequently asked questions What do I do if a FortiGate added by its cloud key stays in an inactive state for more than 24 hours? 1. Check the FortiGate network settings and ensure that port 443 is not blocked. 2. Connect via Telnet to logctrl1.fortinet.com or globallogctrl.fortinet.net (if FortiOS supports Anycast) through port 443. 3. In the FortiOS GUI, activate FortiGate Cloud as To provision a FortiGate or FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 25 describes. What do I do if the "Device is already in inventory" message appears when importing a FortiGate by key? This message means that the device has already been added to an account inventory. Another user may have tried to add the device to another account. If you cannot find the device on the Inventory page, contact cs@fortinet.com. What do I do if the invalid key message appears when importing a FortiGate by key? The FortiCloud key is for one-time use only. Log into the FortiGate and activate FortiGate Cloud as To provision a FortiGate or FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 25 describes instead. If you cannot connect to the FortiOS GUI, contact cs@fortinet.com to reenable the key. What do I do if FortiGate Cloud activation via the FortiOS GUI succeeds, but I cannot find the FortiGate in the FortiGate Cloud portal? When a new FortiGate is added to FortiGate Cloud, FortiGate Cloud dispatches it to the global or Europe region based on its IP address geolocation. If the FortiGate warranty region is Japan, FortiGate Cloud dispatches it to the Japan region. FortiGate Cloud 25.2 Administration Guide 90 Fortinet Inc.Frequently asked questions How can I move a FortiGate from region A to region B? 1. Log in to FortiGate Cloud region A. 2. Undeploy the device. 3. Verify that the device has returned to the Inventory page. 4. Switch the portal to region B. 5. Go to Inventory and deploy the device. How can I connect to FortiGate by remote access? You must set the FortiOS central management setting to FortiCloud. The management tunnel status must be up. See How can I establish a management tunnel connection between my FortiGate and FortiGate Cloud? on page 89. See Accessing a FortiGate on page 26. How can I activate FortiGate Cloud using a different email FortiCare account when FortiOS does not allow entering another email? execute fortiguard-log login What do I do if the migrate notice still appears after successful migration? The migrate notice appears when FortiOS detects differfent email addresses used for FortiCare and FortiGate Cloud. FortiOS has a known issue that it is case-sensitive when verifying an email address. For example, FortiOS may consider example@mail.com and Example@mail.com as different email addresses. Contact cs@fortinet.com to ensure both accounts use all lower-case letters. FortiGate Cloud 25.2 Administration Guide 91 Fortinet Inc.Frequently asked questions What do I do if FortiDeploy does not work? 1. Ensure that the FortiManager settings are correct and the device can connect to FortiManager. 2. Confirm that the central management setting on the device is set to FortiCloud. 3. Ensure that the device can connect to logctrl1.fortinet.com via port 443. 4. Import the device to the inventory by FortiCloud key. See To provision a FortiGate/FortiWifi to FortiGate Cloud using the FortiCloud key: on page 24. 5. Deploy the device to FortiManager, then power up the device. If the device is already powered up, run execute fortiguard-log join. 6. If the FortiCloud key has been used and is invalid for reuse, log into the device GUI and activate FortiGate Cloud as To provision a FortiGate or FortiWifi to FortiGate Cloud in the FortiOS GUI: on page 25 describes. What do I do if FortiOS does not upload logs? Gather debug logs for the following commands, then send the debug output to fortigatecloud@forticloud.com. Check log upload settings on the FortiGate and ensure that it is configured to send logs to FortiGate Cloud: execute telnet 514 diagnose test application forticldd 1 diagnose test application miglogd 6 diagnose debug application miglogd -1 diagnose debug enable diagnose test application forticldd 3 show full log fortiguard setting What do I do if FortiGate Cloud cannot retrieve logs from FortiOS when the data source is set as FortiGate Cloud? Ensure that you can see logs in the FortiGate Cloud portal. In poor network conditions, increase the timeout period to avoid connection timeout: config log fortiguard setting set conn-timeout 120 end You may use the Fortinet support tool Chrome extension to troubleshoot issues. See Technical Tip: Fortinet Support Tool - Google Chrome Extension for troubleshooting GUI issues. FortiGate Cloud 25.2 Administration Guide 92 Fortinet Inc.Frequently asked questions How can I export more than 2000 lines of logs? FortiGate Cloud only supports raw log download for FortiGates with a FortiGate Cloud subscription. See To download a log: on page 37. Why does FortiGate Cloud drop some logs from my FortiGate? A FortiGate with implicit policy logging settings enabled uploads a large amount of redundant logs, causing processing delays and overloading on the log server. The amount of redundant logs uploaded can be large enough to block all log uploads from the FortiGate. Therefore, FortiGate Cloud drops logs matching the following conditions: l policyid=0 l sentbyte=0 l rcvdbyte=0 l no crscore l subtype="local" How can I receive a daily report by email? Ensure that FortiGate Cloud generated the scheduled report and that you have added the email address. See Reports on page 32. Why does FortiGate not submit files for Sandbox scanning? Check the FortiGate settings: l For FortiOS 6.2 and later versions: l Ensure that FortiGate Cloud has been activated. l Go to Security Profiles > AntiVirus. Ensure that Suspicious Files Only or All Supported Files is enabled. l For FortiOS 6.0 and earlier versions: l Go to System > Feature Visibility, then enable FortiSandbox Cloud. l Go to Security Fabric > Settings. Enable Sandbox Inspection. l Go to Security Profiles > AntiVirus. Ensure that Suspicious Files Only or All Supported Files is enabled. l Go to Policy & Objects > IPv4 Policy. Enable antivirus for the policy in use. FortiGate Cloud 25.2 Administration Guide 93 Fortinet Inc.Frequently asked questions What backup retention does FortiGate Cloud provide? Backup does not have storage limits. For licensed devices, the retention period is one year. How does automatic backup work? Automatic backup is either per session or day. FortiGate setting changes from FortiOS or FortiGate Cloud trigger backup. If there is no changes to FortiGate settings, FortiGate Cloud does not perform a backup. See To schedule an automatic backup: on page 69. What does it mean if a geolocation attribute configuration change log/alert is received? This is a feature to sync a FortiGate device''s geolocation information between the FortiOS GUI, FortiGate Cloud, and the Asset Management portal. When a new device is being provisioned, or there is a change in a provisioned device''s IP address, or a user moves a device to another location on the map view, its new geolocation attributes are pushed to the device via the management tunnel with username as FortiGateCloud. Since the geolocation database may not be entirely accurate, it is possible that a device is placed at a wrong location on the map, but you can move the device to its correct location on Map View. What do I do if FortiGate Cloud does not reflect a new hostname on a FortiGate or FortiGate Cloud overwrites a new FortiGate hostname? To synchronize the local hostname on a FortiGate and in FortiGate Cloud, compare the times of the FortiGate Cloud portal change and the local hostname modification on the device GUI. Use whichever time is the latest. l When you change the hostname within the FortiGate Cloud portal, FortiGate Cloud pushes the change to the device via the management tunnel. l When you change the hostname within the device GUI, the device only sends the new hostname to FortiGate Cloud with its next FCP UpdateMgr request. To ensure that FortiGate Cloud can immediately reflect hostname changes, you can run the following in the CLI after changing the hostname: FortiGate Cloud 25.2 Administration Guide 94 Fortinet Inc.Frequently asked questions diagnose fdsm contract-controller-update Why is my FortiGate deployed to a region other than global (U.S. or Europe)? There are several possible cases: l The FortiGate has a physical IP address outside of North America, and thus FortiGate Cloud''s dispatcher server deploys the device according to its IP address''s geolocation. l When activating FortiGate Cloud from the web UI, for some FortiOS versions, the user could choose a region to deploy the device. The default region is global, and the user could optionally select Europe or U.S. l For U.S. government orders, the FortiGate has a US-Government license key burnt in BIOS, and therefore such a device could only be provisioned to the US region of FortiGate Cloud. For a FortiGate VM instance, the default server location is usa, and therefore, to provision a VM instance to another region other than US, you must first change its server location configuration to ''automatic''. How do I check if my FortiGate has been preset for a specific server location? In CLI, browse for update-server-location under system fortiguard settings. For a device with a USG license key, update-server-location does not apply, so you can use the get system status to check for License Status: US-Government(USG). Can I change the server location configuration? Yes, for non-USG FortiGates, run the following commands in CLI to change this configuration: config system fortiguard set update-server-location || end FortiGate Cloud 25.2 Administration Guide 95 Fortinet Inc.Frequently asked questions If my FortiGate''s server location is automatic/any, how do I deploy it to my preferred region? You may choose the preferred region from the web UI FortiGate Cloud activation page, or run the following commands in the CLI: exe fortiguard-log login . Can I migrate logs uploaded or reports generated to a different region? No, you cannot migrate existing data cannot to another region. FortiGate Cloud only uploads new data to the new region from the time that you updated the region settings. What should I do if I accidentally upgrade FortiOS to 7.4.2 or higher on a FortiGate without a FortiGate Cloud Service subscription and remote access to the device becomes read-only? For the following FortiOS versions, the remote access feature requires a FortiGate Cloud Service subscription license on the FortiGate to have read and write access: l 7.6.0 and later versions l 7.4.2 and later versions l 7.2.8 and later versions l 7.0.14 and later versions If you are considering or in the process of purchasing the license, contact Fortinet Support. They can apply a short-term trial license to your device to resolve the issue. Alternatively, you can access your FortiGate via its web interface. If you do not have access to the FortiGate''s web interface, contact Fortinet Support with a description of the situation. FortiGate Cloud 25.2 Administration Guide 96 Fortinet Inc.Frequently asked questions After I transfer my FortiGate to another account in the Asset Management portal, do I still need to transfer it in FortiGate Cloud? After you transfer a FortiGate from account A to B in the Asset Management portal, it is undeployed from account A with existing data retained under account A. The FortiGate is available for deployment under Asset list > Add FortiGate > Inventory in account B in FortiGate Cloud. After reactivating FortiGate Cloud using account B, you must ensure that the FortiGate central management and log destination are configured as FortiGate Cloud in Security Fabric > Fabric Connectors. Does FortiGate Cloud support data backups and disaster recovery? FortiGate Cloud is ISO 27001- and SOC2-compliant and supports standard procedures for data backup and redundancy and disaster recovery. What happens if you enable the automatic firmware upgrade on FortiGate Cloud and the FortiGate? The firmware profile assignment within FortiGate Cloud disables the local automatic firmware upgrade configuration on the FortiGate. Can I disable automatic firmware upgrade from FortiOS by logging in directly to the FortiGate that has no FortiGate Cloud subscription to bypass the automatic firmware upgrade enforcement from FortiGate Cloud? FortiGate Cloud does not automatically upgrade devices without a FortiGate Cloud subscription to the latest patch. For devices without a subscription to continue using cloud features, you must manually upgrade the device to the latest FortiGate Cloud 25.2 Administration Guide 97 Fortinet Inc.Frequently asked questions patch, such as upgrading the device manually via FortiGate Cloud or by using the automatic firmware upgrade feature in FortiOS. If you do not upgrade the device to the latest patch, the device cannot use FortiGate Cloud features and stops uploading logs to FortiGate Cloud. For devices with a FortiGate Cloud subscription, automatic firmware upgrades using a firmware profile is available as an optional feature. If you have configured a firmware profile in FortiGate Cloud for a device, you do not need to disable the automatic firmware upgrade feature in FortiOS. How can I activate FortiGate Cloud on a FortiGate provisioned to an OU placeholder account? To activate FortiGate Cloud, run the following in the CLI: execute fortiguard-log join To refresh the management tunnel connection, run the following in the CLI: config system central-management set type fortiguard end diagnose fdsm contract-controller-update fnsysctl killall fgfmd FortiGate Cloud 25.2 Administration Guide 98 Fortinet Inc.www.fortinet.com Copyright© 2025 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.">
To view the full page, please visit: Firewall as a Service - Powered by Fortinet Product Userguide

Firewall as a Service - Powered by Fortinet

A fully managed cloud-native Firewall-as-a-Service (FWaaS) solution, delivering enterprise-grade security, advanced threat protection, and seamless integration with Alibaba Cloud workloads. Deploy in minutes, scale on demand, and enforce consistent security policies across hybrid environments.
Buy now