index
int64
0
4.08k
text
stringlengths
34
4.9k
url
stringclasses
38 values
4,055
Troubleshooting To view session data in the CLI: diagnose sys session list An entry is placed in the session table for each traffic session passing through a security policy To filter session data: diagnose sys session filter <option> The values for <option> include the following: Value Definition clear Clear session filter dintf Destination interface dport Destination port dst Destination IP address duration Duration of the session expire Expire negate Inverse filter nport NAT'd source port nsrc NAT'd source ip address policy Policy ID proto Protocol number proto-state Protocol state session-state1 Session state1 session-state2 Session state2 sintf Source interface sport Source port src Source IP address vd Index of virtual domain, -1 matches all Even though UDP is a sessionless protocol, FortiGate keeps track of the following states: l When UDP reply does not have a value of 0 l When UDP reply has a value of 1 The following table displays firewall session states from the session table: State Description log Session is being logged FortiOS 7.6.2 Administration Guide 4056 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,056
Troubleshooting State Description local Session is originated from or destined for local stack ext Session is created by a firewall session helper may_dirty Session is created by a policy For example, the session for ftp control channel will have this state but ftp data channel won't. This is also seen when NAT is enabled. ndr Session will be checked by IPS signature nds Session will be checked by IPS anomaly br Session is being bridged (TP) mode Examining the firewall session list The firewall session list displays all open sessions in FortiGate. Examine the list for strange patterns, such as no sessions apart from the internal network, or all sessions are only to one IP address. When you examine the firewall session list in the CLI, you can use filters to reduce the output. To examine the firewall session list in the CLI: You can use a filter to limit the sessions displayed by source, destination address, port, or NAT'd address. To use more than one filter, enter a separate line for each value. The following example filters the session list based on a source address of 10.11.101.112: FGT# diagnose sys session filter src 10.11.101.112 FGT# diagnose sys session list The following example filters the session list based on a destination address of 172.20.120.222. FGT# diagnose sys session filter dst 172.20.120.222 FGT# diagnose sys session list To clear all sessions corresponding to a filter: FGT# diagnose sys session filter dst 172.20.120.222 FGT# diagnose sys session clear Checking source NAT information Checking source NAT is important when you are troubleshooting from the remote end of the connection outside the firewall. To check the source NAT information in the CLI: When you display the session list in the CLI, you can match the NAT'd source address (nsrc) and port (nport). This is useful when multiple internal IP addresses are NAT'd to a common external-facing source IP address. FGT# diagnose sys session filter nsrc 172.20.120.122 FGT# diagnose sys session filter nport 8888 FGT# diagnose sys session list FortiOS 7.6.2 Administration Guide 4057 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,057
Troubleshooting Finding object dependencies You may be prevented from deleting a configuration object when other configuration objects depend on it. You can use the GUI or CLI to identify objects which depend on, or make reference to the configuration you are trying to delete. Additionally, if you have a virtual interface with dependent objects, you will need to find and remove those dependencies before deleting the interface. To remove interface object dependencies in the GUI: 1. Go to Network > Interfaces. The Ref. column displays the number of objects that reference this interface. 2. Select the number in the Ref . column for the interface. A window listing the dependencies appears. 3. Use these detailed entries to locate and remove object references to this interface. The trash can icon is enabled after all the object dependencies are removed. 4. Remove the interface by selecting the check box for the interface, and select Delete. To find object dependencies in the CLI: When running multiple VDOMs, use the following command in the global configuration only. diagnose sys cmdb refcnt show <path.object.mkey> The command searches for the named object in both the most recently used global and VDOM configurations. Examples To verify which objects a security policy with an ID of 1 refers to: diagnose sys cmdb refcnt show firewall.policy.policyid 1 To check what is referred to by interface port1: diagnose sys cmdb refcnt show system.interface.name port1 To show all dependencies for an interface: diagnose sys cmdb refcnt show system.interface.name <interface name> Sample output: In this example , the interface has dependent objects, including four address objects, one VIP, and three security policies. entry used by table firewall.address:name '10.98.23.23_host’ entry used by table firewall.address:name 'NAS' entry used by table firewall.address:name 'all' entry used by table firewall.address:name 'fortinet.com' entry used by table firewall.vip:name 'TORRENT_10.0.0.70:6883' entry used by table firewall.policy:policyid '21' entry used by table firewall.policy:policyid '14' entry used by table firewall.policy:policyid '19' FortiOS 7.6.2 Administration Guide 4058 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,058
Troubleshooting Diagnosing NPU-based interfaces You can use the commands in this section to diagnose sessions offloaded to network processors (also called NPUs or NPs) in your FortiGate. Most FortiGates contain one or more of the following NPUs: l NP7 or NP7Lite l NP6, NP6XLite or NP6Lite You can find your FortiGate unit in the Hardware Acceleration Guide to determine its NPU configuration. Normally you can use the diagnose debug flow command to view sessions. However, this command only displays sessions processed by the CPU (also called software sessions). To view sessions offloaded to NPUs (also called hardware sessions), you must use the commands and techniques described in this section. Alternatively, you can disable NPU offloading and then use the diagnose debug flow command. You should only disable the NPU functionality for troubleshooting purposes. Diagnosing NP7 or NP7Lite sessions Use the following command to list the NP7 processors in your FortiGate unit and the interfaces that they connect to: diagnose npu np7 port-list Use the following command to list the NP7Lite processors in your FortiGate unit and the interfaces that they connect to: diagnose npu np7lite port-list To use the NP7 packet sniffer On FortiGates with NP7 and NP7Lite processors, you can use the following command to view sessions: diagnose npu sniffer {start | stop | filter} Here is a basic example to sniff offloaded TCP packets received by the port23 interface. In the following example: l The first line clears the filter. l The second line sets the sniffer to look for packets on port23. l The third line looks for packets exiting the interface. l The fourth line looks for TCP packets. l The fifth line starts the sniffer. l The sixth line starts displaying the packets on the CLI. diagnose npu sniffer filter diagnose npu sniffer filter intf port23 diagnose npu sniffer filter dir 1 diagnose npu sniffer filter protocol 6 diagnose npu sniffer start diagnose sniffer packet npudbg For more information, see NP7 packet sniffer or Tracing packet flow on FortiGates with NP7 processors. See this Fortinet Community article for an NP7 packet sniffer example: Troubleshooting Tip: Collecting NP7 packet capture without disabling offload. FortiOS 7.6.2 Administration Guide 4059 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,059
Troubleshooting Diagnosing NP6, NP6XLite or NP6Lite sessions Use either of the following commands to list the NP6 processors in your FortiGate unit and the interfaces that they connect to: get hardware npu np6 port-list diagnose npu np6 port-list Use the following command to list the NP6XLite processors in your FortiGate unit: get hardware npu np6xlite port-list Use either of the following commands to list the NP6Lite processors in your FortiGate unit: get hardware npu np6lite port-list diagnose npu np6lite port-list The output of all of these commands includes the device ID or dev_id of each NP processor. Only FortiGates with NP6 processors have multiple dev_ids. On FortiGates with one NP6, NP6Xlite, or NP6Lite processor, dev_id is always 0. To diagnose NP6, NP6XLite, or NP6 sessions, disable NPU offloading. diagnose npu <processor> fastpath disable <dev_id> Then use the diagnose debug flow command to view sessions. Identifying the XAUI link used for a specific traffic stream The diagnose npu np6 xaui-hash command takes a 6-tuple input of the traffic stream to identify the NP6 XAUI link that the traffic passes through. This command is only available on the 38xxD, 39xxD, 34xxE, 36xxE, and 5001E series devices. Syntax diagnose npu np6 xaui-hash <interface> <proto> <src_ip> <dst_ip> <src_port> <dst_port> Variable Description <interface> The network interface that the packets are coming from. <proto> The proto number, 6 for TCP or 17 for UDP. <src_ip> The source IP address. <dst_ip> The destination IP address. <src_port> The source port. <dst_port> The destination port. Examples # diagnose npu np6 xaui-hash port1 6 1.1.1.1 2.2.2.1 4567 80 NP6_ID: 0, XAUI_LINK: 2 # diagnose npu np6 xaui-hash port1 6 1.1.1.1 2.2.2.1 4567 200 NP6_ID: 6, XAUI_LINK: 2 FortiOS 7.6.2 Administration Guide 4060 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,060
Troubleshooting # diagnose npu np6 xaui-hash port1 6 1.1.1.1 2.2.2.1 4567 20 NP6_ID: 1, XAUI_LINK: 2 # diagnose npu np6 xaui-hash port1 6 1.1.1.1 2.2.2.1 4567 23 NP6_ID: 1, XAUI_LINK: 1 The NP6_ID is the NP index of the model that is being used. It can be found with the diagnose npu np6 port-list command. Running the TAC report The Technical Assistance Center (TAC) report runs an exhaustive series of diagnostic commands. Some of the commands are only needed if you are using features, such as HA, VPN tunnels, or a modem. Fortinet support my ask you to use the report output to provide information about the current state of your FortiGate. Due the amount of output generated, the report may take a few minutes to run. If you are logging CLI output to a file, you can run this command to familiarize yourself with the diagnostic commands. To run the TAC report in the CLI: execute tac report Using the process monitor The Process Monitor displays running processes with their CPU and memory usage levels. Administrators can sort, filter, and terminate processes within the Process Monitor pane. To access the process monitor: 1. Go to Dashboard > Status: l Left-click in the CPU or Memory widget and select Process Monitor. l Click the user name in the upper right-hand corner of the screen, then go to System > Process Monitor. The Process Monitor appears, which includes a line graph, donut chart, and process list. FortiOS 7.6.2 Administration Guide 4061 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,061
Troubleshooting 2. Click the + beside the search bar to view which columns can be filtered. To kill a process within the process monitor: 1. Select a process. 2. Click the Kill Process dropdown. 3. Select one of the following options: l Kill: the standard kill option that produces one line in the crash log (diagnose debug crashlog read). l Force Kill: the equivalent to diagnose sys kill 9 <pid>. This can be viewed in the crash log. FortiOS 7.6.2 Administration Guide 4062 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,062
Troubleshooting l Kill & Trace: the equivalent to diagnose sys kill 11 <pid>. This generates a longer crash log and backtrace. A crash log is displayed afterwards. Computing file hashes The following command computes the SHA256 file hashes for all of the files in a directory or directories: # diagnose sys filesystem hash <paths> -d [depth] <paths> Add up to 25 paths to show only the hash for the files at those paths. -d [depth] Specify the maximum depth of the traversal. This command can be used for troubleshooting and debugging the system. The file hashes of system files can be compared against known good system files to help identify any compromises made on the system files. To hash all filesystems: # diagnose sys filesystem hash Hash contents: /bin 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/syslogd -> /bin/init 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/acd -> /bin/init 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/httpsnifferd -> /bin/init 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/merged_daemons -> /bin/init ... /bin/init 6e2e07782dc17b8693268989f8ba1a8858a73d5291fb521e315011731cefe412 /bin/setpci 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/wad_csvc_cs -> FortiOS 7.6.2 Administration Guide 4063 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,063
Troubleshooting /bin/init 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/fds_notify -> /bin/init ... Hash contents: /lib 3dae8f9c15da465ffda24cebc1328725e98ee7c94a20e54af6ead7eaada45d9d /lib/libusb-1.0.so.0 e50c6b5cad36b200d4903e4d7d5e5eac1f5c618d27fd6961011e28a892ed8866 /lib/libk5crypto.so.3 b021ad6fb16ce1e881ca586036687c1b2ae9555805817ef394284528d9e71612 /lib/libgomp.so.1 ... To hash specific filesystem, add the name of the filesystem: # diagnose sys filesystem hash /sbin Hash contents: /sbin c1f81e67a53bcf70720748fe31c2380e95b4c3dfdb96957fd116fcf702bd797b /sbin/init Filesystem hash complete. Hashed 1 files. To hash multiple filesystems, add the names of the filesystems: Up to 25 file systems can be added. # diagnose sys filesystem hash /sbin /bin Hash contents: /sbin c1f81e67a53bcf70720748fe31c2380e95b4c3dfdb96957fd116fcf702bd797b /sbin/init Hash contents: /bin 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/syslogd -> /bin/init 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/acd -> /bin/init 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/httpsnifferd -> /bin/init 5132b40a66fd4cf062adb42e2af43cb9aea0672cf885f12978e8de2f3137834b /bin/merged_daemons -> /bin/init To specify the maximum depth of the traversal: # diagnose sys filesystem hash /data2 -d 1 Hash contents: /data2 a0166e804dc3d9a68fcc8015cb2d214ec40f0609e8e2aecc0eb2e5bdffc45524 /data2/new_alert_msg 7270b43899e0f72c7b9c94e66d64fd0e19881d91f74bd5ae6556eba045222e84 /data2/vir 8092e73c6a68f3cb02c86155bf3e55b2c1ab793eafcdd538beb5aa998d4b6b82 /data2/vir.x 2e29084d86f3925a0fb6bf96c4d83a6d3025fdd9cf8059ebcfc307153b9fd63b /data2/virext 48ac27b0b5b10b3b0f3ab2f847406d524709c32117f6b721bb10448742bd5eb6 /data2/virext.x 2e29084d86f3925a0fb6bf96c4d83a6d3025fdd9cf8059ebcfc307153b9fd63b /data2/virexdb 601316a029b28757c44515e37f48de2985d9fe8ef5c318e5f67e51369cba09f0 /data2/virexdb.x 7270b43899e0f72c7b9c94e66d64fd0e19881d91f74bd5ae6556eba045222e84 /data2/virfldb 896b71b3d9b209d339213f9d4af4088d3addd891cd292e93b5168eddb36b599a /data2/virfldb.x 0af98283f9bcb7dff4974197f1c7f1b1013ec741c8cc6c1425119fb88f9a351b /data2/ffdb_map_ default_res 627d2aed79770f698dbfc2bc0889f8285d1ea596c2dace8e6d3e7f00e040d990 /data2/madb.dat 96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7 /data2/signature_ result ceab5e70a5368aa834842973241e1ae6ca49ff5c88afb6199e5d87e1749caeb1 /data2/revision_ info_db 7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6 /data2/alci.dat FortiOS 7.6.2 Administration Guide 4064 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,064
Troubleshooting 5840dfcf66d296be775e4e4d08bcdd014d1c91bd45e070587907d9eedab53e3e /data2/uwdb dc64fb8a291c7fc6d655474d00e2c42e7bb2b466de4489d33301f3ba82f64794 /data2/ffdb_ pkg.tgz.x c66a6ccc586ce29d38854a6afee49c0464fdc0064b59c4a104544325fd1ff03f /data2/afdb Filesystem hash complete. Hashed 17 files. # diagnose sys filesystem hash /data2 -d 2 Hash contents: /data2 a0166e804dc3d9a68fcc8015cb2d214ec40f0609e8e2aecc0eb2e5bdffc45524 /data2/new_alert_msg 7270b43899e0f72c7b9c94e66d64fd0e19881d91f74bd5ae6556eba045222e84 /data2/vir 8092e73c6a68f3cb02c86155bf3e55b2c1ab793eafcdd538beb5aa998d4b6b82 /data2/vir.x 2e29084d86f3925a0fb6bf96c4d83a6d3025fdd9cf8059ebcfc307153b9fd63b /data2/virext 48ac27b0b5b10b3b0f3ab2f847406d524709c32117f6b721bb10448742bd5eb6 /data2/virext.x 2e29084d86f3925a0fb6bf96c4d83a6d3025fdd9cf8059ebcfc307153b9fd63b /data2/virexdb 601316a029b28757c44515e37f48de2985d9fe8ef5c318e5f67e51369cba09f0 /data2/virexdb.x 7270b43899e0f72c7b9c94e66d64fd0e19881d91f74bd5ae6556eba045222e84 /data2/virfldb 896b71b3d9b209d339213f9d4af4088d3addd891cd292e93b5168eddb36b599a /data2/virfldb.x 0af98283f9bcb7dff4974197f1c7f1b1013ec741c8cc6c1425119fb88f9a351b /data2/ffdb_map_ default_res 627d2aed79770f698dbfc2bc0889f8285d1ea596c2dace8e6d3e7f00e040d990 /data2/madb.dat 96a296d224f285c67bee93c30f8a309157f0daa35dc5b87e410b78630a09cfc7 /data2/signature_ result 5ce22b4398f63fea2b47b7c1f00813a29851714993aee1269d3e95cbf43f4252 /data2/geodb/geoip.1 81ad258e278019dbd34fd07ba33966a6ff04e3fa352dddfe9ff362ac26d3cc88 /data2/config/cfg0000000001 e0067eb3d67b21cf39f27cb3558c5fbdafbc2c17c2afc29ab776b08e9c777a13 /data2/config/cfg0000000002 e77ad7c6b5d620d49f0f11933baf633335621de848a4229c3724152fff9aa4fa /data2/config/cfg0000000003 228a7ed52779ba23f41a2423bfa7dbe858f24433f1702161f27678df4894f358 /data2/config/cfg0000000004 fe9e7afe7a6ccb739cb45c8d8f3b985377242ab61cc8199fa33dd475db49420f /data2/config/cfg0000000005 b632b77348a54a2479453ab0f2c9f8e3c1e910badc8fbfb3fb841acf8eb4e35e /data2/config/cfg0000000006 baeccb81d75f1f31503d42d3526f8831044144051f562486a89f1c5e4dd46d9c /data2/config/cfg0000000007 ceab5e70a5368aa834842973241e1ae6ca49ff5c88afb6199e5d87e1749caeb1 /data2/revision_ info_db 7eb70257593da06f682a3ddda54a9d260d4fc514f645237f5ca74b08f8da61a6 /data2/alci.dat 5840dfcf66d296be775e4e4d08bcdd014d1c91bd45e070587907d9eedab53e3e /data2/uwdb dc64fb8a291c7fc6d655474d00e2c42e7bb2b466de4489d33301f3ba82f64794 /data2/ffdb_ pkg.tgz.x c66a6ccc586ce29d38854a6afee49c0464fdc0064b59c4a104544325fd1ff03f /data2/afdb Filesystem hash complete. Hashed 25 files. An error message is shown if an incorrect value is entered: # diagnose sys filesystem hash /test-path ERROR: Could not fetch info for path /test-path (No such file or directory) Filesystem hash complete. Hashed 0 files. # diagnose sys filesystem hash /bin -d 0 ERROR: depth must be greater than zero. (0) Command fail. Return code -651 FortiOS 7.6.2 Administration Guide 4065 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,065
Troubleshooting Other commands You may be asked to provide the following information when you contact Fortinet support. l ARP table on page 4066 l IP address on page 4068 ARP table The ARP table is used to determine the destination MAC addresses of the network nodes, as well as the VLANs and ports from where the nodes are reached. To view the ARP table: # get system arp Address Age(min) Hardware Addr Interface 10.10.1.3 1 50:b7:c3:75:ea:dd internal7 192.168.0.190 0 28:f1:0e:03:2a:97 wan1 192.168.0.97 0 f4:f2:6d:37:b0:99 wan1 To view the ARP cache in the system: # diagnose ip arp list index=14 ifname=internal7 10.10.1.3 50:b7:c3:75:ea:dd state=00000004 use=2494 confirm=1995 update=374 ref=3 index=5 ifname=wan1 192.168.0.190 28:f1:0e:03:2a:97 state=00000002 use=88 confirm=86 update=977639 ref=2 index=22 ifname=internal 192.168.1.111 00:0c:29:c6:79:3d state=00000004 use=3724 confirm=9724 update=3724 ref=0 index=5 ifname=wan1 224.0.1.140 01:00:5e:00:01:8c state=00000040 use=924202 confirm=930202 update=924202 ref=1 index=5 ifname=wan1 192.168.0.97 f4:f2:6d:37:b0:99 state=00000002 use=78 confirm=486 update=614 ref=26 index=14 ifname=internal7 10.10.1.11 state=00000020 use=172 confirm=1037790 update=78 ref=2 ARP request and cache The FortiGate must make an ARP request when it tries to reach a new destination. The base ARP reachable value determines how often an ARP request it sent; the default is 30 seconds. The actual ARP reachable time is a random number between half and three halves of the base reachable time, or 15 to 45 seconds. The random number is updated every five minutes. ARP entries in the ARP cache are updated based on the state of the ARP entry and the objects that are using it, as highlighted in the following output sample: index=5 ifname=wan1 224.0.1.140 01:00:5e:00:01:8c state=00000040 use=924202 confirm=930202 update=924202 ref=1 There are multiple possible states for an ARP entry, and the state-transition mechanism can be complex. Common states include the following: FortiOS 7.6.2 Administration Guide 4066 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,066
Troubleshooting State Meaning Description 000000002 or 0x02 REACHABLE An ARP response was received 000000004 or 0x04 STALE No ARP response within the expected time 000000008 or 0x08 DELAY A transition state between STALE and REACHABLE before Probes are sent out 000000020 or 0x20 FAILED Did not manage to resolve within the maximum configured number of probes 000000040 or 0x40 NOARP Device does not support ARP, e.g. IPsec interface 000000080 or 0x80 PERMANENT A statically defined ARP entry An entry that is in the STALE (0x04) or FAILED (0x20) states with no references to it (ref=0) can be deleted. Many factors affect the state-transmit mechanism and if an entry is used by other subsystems. For example, ARP creation, ARP request/reply, neighbor lookup, routing, and others can cause an ARP entry to be in use or referenced. The garbage collection mechanism runs every 30 seconds, and checks and removes stale and unreferenced entries if they have been stale for longer than 60 seconds. Garbage collection will also be triggered when the number of ARP entries exceeds the configured threshold. If the threshold is exceeded, no entries can be added to the ARP table. To set the maximum number of ARP entries threshold: config system global set arp-max-entry <integer> end arp-max-entry <integer> The maximum number of dynamically learned MAC addresses that can be added to the ARP table (131072 to 2147483647, default = 131072). To set the ARP reachable time on an interface: config system interface edit port1 set reachable-time <integer> next end reachable-time <integer> The reachable time (30000 to 3600000, default = 30000). To clear all of the entries in the ARP table: execute clear system arp table To delete a single ARP entry from the ARP table: diagnose ip arp delete <interface name> <IP address> FortiOS 7.6.2 Administration Guide 4067 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,067
Troubleshooting To add static ARP entries: config system arp-table edit 1 set interface "internal" set ip 192.168.50.8 set mac bc:14:01:e9:77:02 next end To view a summary of the ARP table: # diagnose sys device list root list virtual firewall root info: ip4 route_cache: table_size=65536 max_depth=2 used=31 total=34 arp: table_size=16 max_depth=2 used=5 total=6 proxy_arp: table_size=256 max_depth=0 used=0 total=0 arp6: table_size=32 max_depth=1 used=3 total=3 proxy_arp6: table_size=256 max_depth=0 used=0 total=0 local table version=00000000 main table version=0000002b vf=root dev=root vrf=0 vf=root dev=ssl.root vrf=0 ... vf=root dev=internal5 vrf=0 ses=0/0 ses6=0/0 rt=0/0 rt6=0/0 IP address You may want to verify the IP addresses assigned to the FortiGate interfaces are what you expect them to be. To verify IP addresses: diagnose ip address list The output lists the: l IP address and mask (if available) l index of the interface (a type of ID number) l devname (the interface name) While physical interface names are set, virtual interface names can vary. A good way to use this command is to list all of the virtual interface names. For vsys_ha and vsys_fgfm, the IP addresses are the local host, which are virtual interfaces that are used internally. Sample output: # diagnose ip address list IP=10.31.101.100->10.31.101.100/255.255.255.0 index=3 devname=internal IP=172.20.120.122->172.20.120.122/255.255.255.0 index=5 devname=wan1 IP=127.0.0.1->127.0.0.1/255.0.0.0 index=8 devname=root IP=127.0.0.1->127.0.0.1/255.0.0.0 index=11 devname=vsys_ha IP=127.0.0.1->127.0.0.1/255.0.0.0 index=13 devname=vsys_fgfm FortiOS 7.6.2 Administration Guide 4068 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,068
Troubleshooting FortiGuard troubleshooting The FortiGuard service provides updates to AntiVirus (AV), Antispam (AS), Intrusion Protection Services (IPS), Webfiltering (WF), and more. The FortiGuard Distribution System (FDS) consists of a number of servers across the world that provide updates to your FortiGate unit. Problems can occur with the connection to FDS and its configuration on your local FortiGate unit. Some of the more common troubleshooting methods are listed here, including: l Verifying connectivity to FortiGuard on page 4069 l Troubleshooting process for FortiGuard updates on page 4070 l FortiGuard server settings on page 4070 Verifying connectivity to FortiGuard You can verify FortiGuard connectivity in the GUI and CLI. To verify FortiGuard connectivity in the GUI: 1. Got to Dashboard > Status. 2. Check the Licenses widget. When FortiGate is connected to FortiGuard, licensed services are in green icons. To verify FortiGuard connectivity in the CLI: execute ping service.fortiguard.net execute ping update.fortiguard.net Sample output: FG100D# execute ping service.fortiguard.net PING guard.fortinet.net (208.91.112.196): 56 data bytes 64 bytes from 208.91.112.196: icmp_seq=0 ttl=51 time=61.0 ms 64 bytes from 208.91.112.196: icmp_seq=1 ttl=51 time=60.0 ms 64 bytes from 208.91.112.196: icmp_seq=2 ttl=51 time=59.6 ms 64 bytes from 208.91.112.196: icmp_seq=3 ttl=51 time=58.9 ms 64 bytes from 208.91.112.196: icmp_seq=4 ttl=51 time=59.2 ms --- guard.fortinet.net ping statistics --- 5 packets transmitted, 5 packets received, 0% packet loss round-trip min/avg/max = 58.9/59.7/61.0 ms FG100D# execute ping update.fortiguard.net PING fds1.fortinet.com (208.91.112.68): 56 data bytes 64 bytes from 208.91.112.68: icmp_seq=0 ttl=53 time=62.0 ms 64 bytes from 208.91.112.68: icmp_seq=1 ttl=53 time=61.8 ms 64 bytes from 208.91.112.68: icmp_seq=2 ttl=53 time=61.3 ms 64 bytes from 208.91.112.68: icmp_seq=3 ttl=53 time=61.9 ms 64 bytes from 208.91.112.68: icmp_seq=4 ttl=53 time=61.8 ms FortiOS 7.6.2 Administration Guide 4069 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,069
Troubleshooting Troubleshooting process for FortiGuard updates The following process shows the logical steps you should take when troubleshooting problems with FortiGuard updates: 1. Does the device have a valid license that includes these services? Each device requires a valid FortiGuard license to access updates for some or all of these services. You can verify the status of the support contract for your devices at the Fortinet Support website. 2. If the device is part of a high availability (HA) cluster, do all members of the cluster have the same level of support? You can verify the status of the support contract for all of the devices in your HA cluster at the Fortinet Support website. 3. Are services enabled on the device? To see the FortiGuard information and status for a device in the GUI, go to System > FortiGuard. Use this page to verify the status of each component, and enable each service. 4. Can the device communicate with FortiGuard servers? Go to System > FortiGuard in the GUI, and try to update AntiVirus and IPS, or test the availability of Web Filtering and AS default and alternate ports. 5. Is there proper routing to reach the FortiGuard servers? Ensure there is a static or dynamic route that allows your FortiGate to reach the FortiGuard servers. Usually a generic default route to the internet is enough, but you may need to verify this if your network is complex. 6. Are there issues with DNS? An easy way to test this is to attempt a traceroute from behind the FortiGate to an external network using the Fully Qualified Domain Name (FQDN) for a location. If the traceroute FQDN name doesn't resolve, you have general DNS problems. 7. Is there anything upstream that might be blocking FortiGuard traffic, either on the network or ISP side? Many firewalls block all ports, by default, and ISPs often block ports that are low. There may be a firewall between the FortiGate and the FortiGuard servers that's blocking the traffic. By default, FortiGuard uses port 53. If that port is blocked you need to either open a hole for it or change the port it is using. 8. Is there an issue with source ports? It is possible that ports that FortiGate uses to contact FortiGuard are being changed before they reach FortiGuard or on the return trip before they reach FortiGate. A possible solution for this is to use a fixed-port at NAT'd firewalls to ensure the port remains the same. You can use packet sniffing to find more information about what's happening with ports. 9. Are there security policies that include antivirus? If none of the security policies include antivirus, the antivirus database will not be updated. If antivirus is included, only the database type that's used will be updated. FortiGuard server settings Your local FortiGate connects to remote FortiGuard servers to get updates to FortiGuard information, such as new viruses that may have been found or other new threats. The default setting to reach FortiGuard is anycast. However, FortiGate can be configured to use unicast server. See FortiGuard on page 3314 for more information. This section provides methods to display FortiGuard server information on your FortiGate, and how to use that information and update it to fix potential problems. FortiOS 7.6.2 Administration Guide 4070 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,070
Troubleshooting Displaying the server list To get a list of FDS servers FortiGate uses to send web filtering requests: get webfilter status or diagnose debug rating Rating requests are only sent to the server at the top of the list in normal operation. Each server is probed for Round Trip Time (RTT) every two minutes. Rating may not be enabled on your FortiGate. Optionally, you can add a refresh rate to the end of the command to determine how often the server list is refreshed. Sample output: Locale : English Service : Web-filter Status : Enable License : Contract Service : Antispam Status : Disable Service : Virus Outbreak Prevention Status : Disable Num. of servers : 2 Protocol : https Port : 443 Anycast : Disable Default servers : Included -=- Server List (Wed Nov 16 14:42:08 2022) -=- IP Weight RTT Flags TZ FortiGuard-requests Curr Lost Total Lost Updated Time 140.174.22.68 30 866 -5 13 0 0 Wed Nov 16 14:41:35 2022 12.34.97.18 30 878 DI -5 12 0 0 Wed Nov 16 14:41:35 2022 Output details The server list includes the IP addresses of alternate servers if the first entry cannot be reached. In this example, the IP addresses are not public addresses. The following flags in get webfilter status indicate the server status: Flag Description D The server was found through the DNS lookup of the hostname. If the hostname returns more than one IP address, all of them are flagged with D and are used first for INIT requests before falling back to the other servers. FortiOS 7.6.2 Administration Guide 4071 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,071
Troubleshooting Flag Description I The server to which the last INIT request was sent F The server hasn't responded to requests and is considered to have failed T The server is currently being timed S Rating requests can be sent to the server. The flag is set for a server only in two cases: l The server exists in the servers list received from the FortiManager or any other INIT server. l The server list received from the FortiManager is empty so the FortiManager is the only server that the FortiGate knows and it should be used as the rating server. Please note that the example output displays Anycast as Disable because the CLI commands above work with the FortiGuard unicast server case and not with the FortiGuard anycast servers case. Also, in the example output above, the server 12.34.97.18 was found through a DNS lookup (D flag) and was sent the last INIT request (I flag). Sorting the server list The server list is sorted first by weight. The server with the smallest RTT appears at the top of the list, regardless of weight. When a packet is lost (there has been no response in 2 seconds), it is re-sent to the next server in the list. Therefore, the top position in the list is selected based on RTT, while the other positions are based on weight. Calculating weight The weight for each server increases with failed packets and decreases with successful packets. To lower the possibility of using a remote server, the weight isn't allowed to dip below a base weight. The base weight is calculated as the difference in hours between the FortiGate and the server multiplied by 10. The farther away the server is, the higher its base weight is and the lower it appears in the list. View open and in use ports Traffic destined for the FortiGate itself, and not being passed through or dropped, is called local-in traffic. It can be from a variety of services, such as HTTPS for administrative access, or BGP for inter-router communication. Local-in traffic is controlled by local-in policies. To enable viewing local-in policies in the GUI, go to System > Feature Visibility and enable Local In Policy. The Policy & Objects > Local In Policy page shows a read-only list of the local policies, populated with default values, and values that are automatically enabled when the related service is enabled, for example, enabling BGP opens TCP port 179. For more information, see Local-in policy on page 1480. To view ports that are being listened on, and active connections and the services or processes using them: # diagnose sys tcpsock | grep 0.0.0.0 0.0.0.0:10400->0.0.0.0:0->state=listen err=0 socktype=4 rma=0 wma=0 fma=0 tma=0 inode=10621 process=142/authd ... FortiOS 7.6.2 Administration Guide 4072 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,072
Troubleshooting 0.0.0.0:53->0.0.0.0:0->state=listen err=0 socktype=1 rma=0 wma=0 fma=0 tma=0 inode=8067 process=177/dnsproxy 0.0.0.0:22->0.0.0.0:0->state=listen err=0 socktype=1 rma=0 wma=0 fma=0 tma=0 inode=13390 process=225/sshd 0.0.0.0:541->0.0.0.0:0->state=listen err=0 socktype=1 rma=0 wma=0 fma=0 tma=0 inode=13155 process=215/fgfmd ... 0.0.0.0:9980->0.0.0.0:0->state=listen err=0 socktype=1 rma=0 wma=0 fma=0 tma=0 inode=5063 process=129/httpsd 0.0.0.0:179->0.0.0.0:0->state=listen err=0 socktype=1 rma=0 wma=0 fma=0 tma=0 inode=10583 process=148/bgpd ... For more information on incoming and outgoing ports, see the FortiOS Ports guide. IPS and AV engine version The IPS engine is an important module that processes traffic in policies configured with flow-based inspection, next generation firewall policies, as well as any policies that have IPS and application control defined. Just like its counterpart, the WAD daemon in proxy-based inspection, the IPS engine can invoke other daemons to perform additional processing such as certificate inspection, authentication, and other functions. For each FortiOS release, an IPS engine is built into the firmware. You can find information about the IPS engine in its corresponding Release Notes. When a FortiGate is configured for automatic FortiGuard updates and has policies configured to use the IPS engine, it downloads new releases of the IPS engine that are available through the FortiGuard Distribution Network. The IPS Engine package released to FortiGuard is unavailable for manual download. The FortiGate supports manual upgrade/downgrade of the IPS engine in special cases, such as for troubleshooting or resolving a temporary issue that Technical Support deems necessary. In these cases, Technical Support distributes the IPS engine package. Likewise, the AV engine is also built into the FortiOS firmware and available as an automatic update through FortiGuard. You can find information about the AV engine in its corresponding Release Notes. Finally, for compatibility information between IPS and AV engines with FortiOS, see IPS Engine and AV Engine Support for FortiOS and FortiAPS print tablesize You can use the print tablesize command to view a list of the maximum values for your device. The four columns of values provide the following information, respectively: 1. Maximum number of variables allowed for this object type 2. Maximum number of objects of this type allowed per virtual domain (VDOM) 3. System global limit for maximum number of objects of this type 4. Current total number of objects of this type existing in FortiOS A value of 0 indicates that there is no maximum value limit. FortiOS 7.6.2 Administration Guide 4073 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,073
Troubleshooting To check the maximum number of variables that you can append to all log messages: # print tablesize ... log.setting:custom-log-fields: 5 0 0 0 ... This means that you can add up to five variables: config log setting set custom-log-fields <field_1> <field_2> <field_3> <field_4> <field_5> end To check the external resource table size limit for your device: In this example, the device has a global limit of 512, a per-VDOM limit of 256, and there are currently no external resources existing in FortiOS. the available memory on the device limits the total number of feeds. # print tablesize ... system.external-resource: 0 256 512 0 ... To check the current total number of objects of this type existing in FortiOS: # print tablesize system.vdom: 0 0 10 3 system.datasource: 0 0 0 3 system.timezone: 0 0 0 597 system.accprofile: 0 0 10 5 system.np6xlite: 0 256 512 1 system.vdom-link: 0 0 0 3 ... CLI troubleshooting cheat sheet See CLI troubleshooting cheat sheet. CLI error codes CLI error codes are shown in the command line if the command execution fails. The message includes a summary, followed by Command fail. Return code -X, where -X is the error code. For example: # set test Command parse error before ‘test’ Command fail. Return code -61 The following table lists common error codes and their descriptions. FortiOS 7.6.2 Administration Guide 4074 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,074
Troubleshooting Return Code Description 1 Generic CLI syntax error -1 Invalid length of value. -4 Maximum number of entries has been reached. -5 A duplicate entry already exists. -8 Invalid IP Address. -37 Permission denied. -56 Empty values are not allowed. -61 Input not as expected. -160 CFG_ER_GENERIC (common generic configuration error) -553 Name conflicts with an interface, VDOM, switch-interface, zone, or interface name used for hardware switch interfaces. -651 Input value is invalid. Additional resources To learn more about FortiGate and FortiOS, and for information about technical issues, refer to the following resources. Fortinet Document Library Installation Guides, Administration Guides, Quick Start Guides, and other technical documents are available online at the Fortinet Document Library. Release notes Issues that arise after the technical documentation has been published are often listed in the release notes. The release notes are available in the Fortinet Document Library. Fortinet Video Library The Fortinet Video Library hosts a collection of videos that provide valuable information about Fortinet products. Fortinet Community The Fortinet Community provides a place to collaborate, share insights and experiences, and get answers to questions. It incorporates the Fortinet Knowledge Base and technical discussion forums. You can access the Fortinet Community at https://community.fortinet.com. FortiOS 7.6.2 Administration Guide 4075 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,075
Troubleshooting Knowledge Base The Fortinet Knowledge Base provides access to a variety of articles, white papers, and other documentation that provides technical insight into a range of Fortinet products. You can access the Knowledge Base at https://community.fortinet.com/t5/Knowledge-Base/ct-p/knowledgebase. Fortinet technical discussion forums The online technical forum allows administrators to contribute to discussions about issues related to their Fortinet products. Searching the forum can help an administrator identify if an issue has been experienced by another user. You can access the support forum at https://community.fortinet.com/t5/Fortinet-Forum/bd-p/fortinet-discussion. Fortinet Training Institute The Fortinet Training Institute hosts a collection of tutorials and training materials that you can use to increase your knowledge of Fortinet products. You can access these training resources at https://www.fortinet.com/training.html. Fortinet Support You defined your problem, researched a solution, put together a plan to find the solution, and executed that plan. At this point, if the problem has not been solved, contact Fortinet Support for assistance. FortiOS 7.6.2 Administration Guide 4076 Fortinet Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
4,076
www.fortinet.com Copyright© 2025 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf
0
FortiGate-5001E System Guide FortiGate-5000 Series
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
1
FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO GUIDE https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/support-and-training/training.html NSE INSTITUTE https://training.fortinet.com FORTIGUARD CENTER https://fortiguard.com/ END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: techdoc@fortinet.com April 26, 2021 FortiGate-5001E System Guide 01-700-389680-20210426
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
2
TABLE OF CONTENTS Change log 5 FortiGate-5001E and FortiGate-5001E1 security system 6 Physical Description 7 Front panel components 8 LEDs 8 System LEDs 8 BASE and FABRIC network activity LEDs 9 QSFP+ network activity LEDs (port1 and port2) (40G or 4 x 10G) 9 SFP+ network activity LEDs (port3 and port4) (10G) 9 RJ45 management interface LEDs (MGMT1 and MGMT2) 10 Front panel connectors 10 NMI switch 11 Base backplane communication 11 Fabric backplane communication 11 Accelerated packet forwarding and policy enforcement (NP6 network processors) 11 Accelerated IPS, SSL VPN, and IPsec VPN (CP9 content processors) 12 Splitting the FortiGate-5001E front panel port1 and port2 interfaces 13 Hardware installation 14 Installing QSFP+ and SFP+ transceivers 14 To install QSFP+, SFP+ or SFP transceivers 14 Changing the FortiGate-5001E SW6 switch settings 15 Changing or verifying the SW6 switch setting 16 FortiGate-5001E mounting components 17 Inserting a FortiGate-5001E board into a chassis 18 Shutting down and Removing a FortiGate-5001E 21 Resetting a FortiGate-5001E 23 Troubleshooting 24 FortiGate-5001E does not startup 24 FortiGate-5001E status LED is flashing during system operation 24 Fabric backplane communication speed compatibility 25 FortiGate-5001E quick configuration guide 26 Registering your FortiGate-5001E 26 Planning the configuration 26 Choosing the configuration tool 27 Factory default settings 27 Basic GUI configuration 28 Basic CLI  configuration 28 Upgrading FortiGate-5001E firmware 29 FortiGate-5001E fabric and base backplane communication 29 Cautions and Warnings 31 Environmental Specifications 31 Safety 32 FortiGate-5001E System Guide 3 Fortinet Technologies Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
3
Fortinet Technologies Inc. Regulatory Notices 34 Federal Communication Commission (FCC) – USA 34 Industry Canada Equipment Standard for Digital Equipment (ICES) – Canada 34 European Conformity (CE) - EU 34 Voluntary Control Council for Interference (VCCI) – Japan 35 Product Safety Electrical Appliance & Material (PSE) – Japan 35 Bureau of Standards Metrology and Inspection (BSMI) – Taiwan 35 China 35 FortiGate-5001E System Guide 4
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
4
Change log Fortinet Technologies Inc. Change log Date Change description April 26, 2021 Added a note about FortiGate-5001E compatibility with in a with the FortiGate-5060 chassis to FortiGate-5001E and FortiGate-5001E1 security system on page 6. FortiGate-5001E System Guide 5
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
5
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. FortiGate-5001E and FortiGate-5001E1 security system The FortiGate-5001E security system is a high-performance Advanced Telecommunications Computing Architecture (ATCA) compliant FortiGate security system that can be installed in any ATCA chassis that can provide sufficient power and cooling. The FortiGate-5001E1 security system adds an internal 480 GByte SSD log disk. In all other ways the FortiGate-5001E and the FortiGate-5001E1 are identical. The  FortiGate-5001E is compatible with Fortinet’s FortiGate-5144C chassis. See the FortiGate-5000 Compatibility Guide for up-to-date information about FortiGate-5001E compatibility. Up  to six FortiGate-5001Es can also be installed in Fortinet's FortiGate-5060 chassis as standalone FortiGates. Fabric backplane switching is not supported. See the FortiGate-5060 Chassis Guide for details. The FortiGate-5001E security system contains two front panel 40GigE QSFP+ fabric channel interfaces, two front panel 10GigE SFP+ fabric channel interfaces, two base backplane 1Gbps base channel interfaces, and two fabric backplane 40Gbps interfaces. The front panel SFP+ interfaces can also operate as Gigabit Ethernet interfaces using SFP transceivers. Use the front panel interfaces for connections to your networks and the backplane interfaces for communication across the ATCA chassis backplane. The FortiGate-5001E also includes two front panel   10/100/1000BASE-T out of band management Ethernet interfaces, one RJ45 front panel serial console port, and one front panel USB port. FortiGate-5001E front panel MGMT 1 and MGMT 2 10/100/1000BASE-T Copper Management Interfaces 3 and 4 10 GigE SFP+ Fabric Channel Network Interfaces Base and Fabric network activity LEDs RJ-45 Console Extraction Lever Retention Screw USB Extraction Lever Retention Screw IPM LED (board position) OOS LED STA LED PWR LED ACC LED Factory Use NMI Switch 1 and 2 40 GigE Fabric Channel QSFP+ Network Interfaces The FortiGate-5001E front panel 40GigE, 10GigE interfaces and fabric backplane interfaces also provide NP6- accelerated network processing for eligible traffic passing through these interfaces. All data traffic can also be accelerated by CP9 processors. FortiGate-5001E System Guide 6
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
6
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. You can also configure two or more FortiGate-5001Es to create a high availability (HA) cluster using the base or fabric backplane interfaces for HA heartbeat communication through the chassis backplane, leaving front panel interfaces available for network connections. In most cases the base backplane interfaces are used for HA heartbeat communication and the fabric backplane interfaces are used for data communication. The FortiGate-5001E also supports high-end FortiGate features including 802.1Q VLANs, multiple virtual domains, 802.3ad aggregate interfaces, and FortiOS Carrier. The FortiGate-5001E includes the following features: l Two front panel  40GigE QSFP+ fabric channel (port1 and port2) accelerated by NP6 network processors. Using 40GBASE-SR10 multimode QSFP+ transceivers, port1 and port2 can also be split into four 10GBASE-SR interfaces  using the config system global set split-port command. l Two front panel 10GigE SFP+ fabric channel interfaces (port3 and port4) also accelerated by NP6 network processors. These interfaces can also be configured to operate as Gigabit Ethernet interfaces using SFP transceivers. l Two front panel 10/100/10000BASE-T out of band management Ethernet interfaces (mgmt1 and mgmt2). l Two base backplane 1Gbps interfaces (base1 and base2) for HA heartbeat communications across the FortiGate￾5000 chassis base backplane. l Two fabric backplane 40Gbps interfaces (fabric1 and fabric2) for data communications across the FortiGate-5000 chassis fabric backplane. l Two NP6 network processors that accelerate traffic on the interfaces port1 - port4, fabirc1, and fabric2. l Four CP9 content processors that accelerate IPS, DLP, SSL VPN, key exchange, and IPsec VPN. l The FortiGate-5001E1 includes a 480 GB SSD for storing log messages, DLP archives, historic reports, IPS packet archiving, file quarantine, WAN Optimization byte caching and web caching. l One RJ-45 RS-232 serial console connection. l 1 USB connector. l NMI switch for troubleshooting as recommended by Fortinet Support. l Mounting hardware. l LED status indicators. Physical Description Dimensions 1.2 x 11.34 x 14 in. (3.1 x 28.8 x 35.1 cm) (Height x Width x Depth) Weight 8.2 lb. (3.7 kg) Operating Temperature 23 to 131°F (-5 to 55°C) Storage Temperature -40 to 158°F (-40 to 70°C) Relative Humidity 5 to 90% (Non-condensing) Power consumption Maximum 278 W FortiGate-5001E System Guide 7
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
7
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. Average Power Consumption 250 W Max Current 5.9 A Heat Dissipation 948.6 BTU/h Front panel components From the FortiGate-5001E front panel you can view the status of the front panel LEDs to verify that the board is functioning normally. You also connect the FortiGate-5001E to your 40-gigabit network using the front panel QSFP+ connectors and to your 10-gigabit network using the front panel SFP+ or SFP connectors. The front panel also includes two Ethernet management interfaces, an RJ-45 console port for connecting to the FortiOS CLI and a USB port. The USB port can be used with any USB key for backing up and restoring configuration files. LEDs Ports 1 and 2 can operate in 40-gigabit mode or 4 x 10-gigabit mode. The LEDs function differently in each mode. System LEDs LED State Description OOS (Out of Service)   Off Normal operation. Red A fault condition exists and the FortiGate-5001E is out of service (OOS). This LED may also flash very briefly during normal startup. PWR (Power) Off The main power is off. The standby power for IPMC circuits maybe powered on in this state. Green The FortiGate-5001E is powered on. STA (Status) Off The FortiGate-5001E is operating normally. Flashing Green The FortiGate-5001E is starting up. If this LED is flashing at any time other than system startup, a fault condition may exist. ACC (Disk activity)   Off or Flashing green The ACC LED flashes green when the FortiGate-5001E accesses the flash disk. The flash disk stores the current firmware build and configuration files. The system accesses the flash disk when starting up, during a firmware upgrade, or when an administrator is using the CLI or GUI to change the FortiGate-5001E configuration. Under normal operating conditions this LED flashes occasionally, but is mostly off. Also flashes green when the FortiGate-5001E1 reads or writes the 480 GB SSD. FortiGate-5001E System Guide 8
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
8
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. LED State Description IPM (Hot Swap) Off Normal Operation. The FortiGate-5001E is in contact with the chassis backplane. Flashing Blue The FortiGate-5001E is changing from hot swap to running mode or from running mode to hot swap. This happens when the FortiGate￾5001E is starting up or shutting down. Blue The FortiGate-5001E is ready to be hot-swapped (removed from the chassis). If the IPM light is blue and no other LEDs are lit the FortiGate-5001E has lost power. BASE and FABRIC network activity LEDs LED State Description BASE (left base1, right base2) Green Base backplane interfaces are connected at 1 Gbps. Flashing Green Network activity. Off No link. FABRIC (left fabric1, right fabric2) Green Fabric backplane interface is connected at 40 Gbps. Flashing Green Network activity. Off No link. QSFP+ network activity LEDs (port1 and port2) (40G or 4 x 10G) Left LED Right LED Description Green Off Connected at 40Gbps. Flashing Green Amber Connected at 10Gbps. Flashing Green Flashing Amber Connected at 10 Gbps (less than 4 channels).   Off Off No link established. SFP+ network activity LEDs (port3 and port4) (10G) LED State Description Link/ACT Green SFP+ interface connected at  10Gbps. Flashing Green Network activity. Off No link. FortiGate-5001E System Guide 9
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
9
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. RJ45 management interface LEDs (MGMT1 and MGMT2) LED State Description Link/ACT (left) Green Link up. Flashing Green Network activity. Off No link. Speed (right) Green Management interface connected at 1 Gbps. Amber Management interface connected at 100 Mbps. Off No link, or management interface connected at 10 Mbps. Front panel connectors Connector Type Speed Protocol Description CONSOLE RJ-45 9600 bps 8/N/1 RS-232 serial Serial connection to the command line interface. 1 and 2 QSFP+ (40 gigabit) SFP+ (10 gigabit) 40-gigabit full 4x10-gigabit full Ethernet 40-gigabit QSFP+ connection to 40GigE networks or 4x10GigE SFP+ connection to 10GigE networks. Quad small form-factor pluggable transceiver. 3 and 4 SFP+ (10 gigabit) SFP (1 gigabit) 10-gigabit full 1-gigabit auto 1-gigabit full Ethernet 10GigE SFP+ connection to 10GigE networks or 1GigE SFP connection to 1GigE networks. Small form￾factor pluggable transceiver. MGMT1 and MGMT2 RJ-45 10/100/1000 Base-T Ethernet Copper 1GigE connection to 10/100/1000Base-T copper networks for management or system administration. USB USB USB key for firmware updates and configuration backup. FortiGate-5001E System Guide 10
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
10
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. NMI switch When working with Fortinet Support to troubleshoot problems with the FortiGate-5001E you can use the front panel non￾maskable interrupt (NMI) switch to assist with troubleshooting. Pressing this switch causes the software to dump registers/backtraces to the console. After the data is dumped the FortiGate-5001E reboots. While rebooting, traffic is temporarily blocked. The FortiGate-5001E should restart normally and traffic can resume once its up and running. Base backplane communication The FortiGate-5001E base backplane 1-gigabit interfaces (base1 and base2) are typically used for HA heartbeat or other management base backplane communication. You can also configure FortiGate-5001Es to use the base backplane interfaces for data communication. To support base backplane communications your FortiGate-series chassis must include one or more FortiSwitch or FortiController or other 1-gigabit base backplane switches installed in the chassis in hub/switch slots 1 and 2. See the FortiGate-5000 Compatibility Guide for up-to-date information about FortiGate-5000 components that are compatible with the FortiGate-5001E. Fabric backplane communication The FortiGate-5001E fabric backplane interfaces (fabric1 and fabric2) are typically used for fabric backplane data communication. These interfaces can operate as 40-gigabit or 10-gigabit interfaces To support 40-gigabit fabric backplane communications your FortiGate-5000 series chassis must include one or more FortiControllers or other 40-gigabit fabric backplane switches installed in the chassis in fabric slots 1 and 2. To support 10-gigabit fabric backplane communications your FortiGate-5000 series chassis must include one or more FortiSwitches or FortiControllers or other 10-gigabit fabric backplane switches installed in the chassis in hub/switch slots 1 and 2. See the FortiGate-5000 Compatibility Guide for up-to-date information about FortiGate-5000 components that are compatible with the FortiGate-5001E. Accelerated packet forwarding and policy enforcement (NP6 network processors) The FortiGate-5001E includes two NP6 processors and an integrated switch fabric (ISF) that provides fastpath acceleration by offloading communication sessions from the FortiGate CPU. All traffic from the front panel and backplane interfaces can be accelerated. The result is enhanced network performance provided by the NP6 processor plus the network processing load is removed from the CPU. The NP6 processor can also handle some CPU intensive FortiGate-5001E System Guide 11
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
11
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. tasks, like IPsec VPN encryption/decryption. Because of the integrated switch fabric, all sessions are fast-pathed and accelerated. NP6 NP6 Integrated Switch Fabric CPU CP9 CP9 CP9 CP9 System Bus fabric1 5x XAUI 4x XAUI 4x XAUI fabric2 5x XAUI port1 XLAUI port2 XLAUI port4 XLAUI port3 XFI base1 SGMII base2 SGMII Accelerated IPS, SSL VPN, and IPsec VPN (CP9 content processors) The FortiGate-5001E includes four CP9 processors that provide the following performance enhancements: l Flow-based inspection (IPS, application control etc.) pattern matching acceleration with over 10Gbps throughput l IPS pre-scan l IPS signature correlation l Full match processors l High performance VPN bulk data engine l IPsec and SSL/TLS protocol processor l DES/3DES/AES128/192/256 in accordance with FIPS46-3/FIPS81/FIPS197 l MD5/SHA-1/SHA256/384/512-96/128/192/256 with RFC1321 and FIPS180 l HMAC in accordance with RFC2104/2403/2404 and FIPS198 l ESN mode l GCM support for NSA "Suite B" (RFC6379/RFC6460) including GCM-128/256; GMAC-128/256 l Key Exchange Processor that supports high performance IKE and RSA computation FortiGate-5001E System Guide 12
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
12
FortiGate-5001E and FortiGate-5001E1 security system Fortinet Technologies Inc. l Public key exponentiation engine with hardware CRT support l Primary checking for RSA key generation l Handshake accelerator with automatic key material generation l True Random Number generator l Elliptic Curve support for NSA "Suite B" l Sub public key engine (PKCE) to support up to 4096 bit operation directly (4k for DH and 8k for RSA with CRT) l DLP fingerprint support l TTTD (Two-Thresholds-Two-Divisors) content chunking l Two thresholds and two divisors are configurable Splitting the FortiGate-5001E front panel port1 and port2 interfaces You can use the following command to split the 40-gigabit front panel port1 interface into a 4 x 10-gigabit interface: config system global set split-port port1 end The FortiGate-5001E reboots and when it does you can see four new interfaces named port1/1, port1/2, port1/3, and port1/4. FortiGate-5001E System Guide 13
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
13
Hardware installation Fortinet Technologies Inc. Hardware installation This chapter describes installing a FortiGate-5001E (sometimes just referred to as a "board") into a chassis. Before use, the FortiGate-5001E must be correctly inserted into an Advanced Telecommunications Computing Architecture (ATCA) chassis that can provide sufficient power and cooling. Installing QSFP+ and SFP+ transceivers You must install QSFP+ transceivers to connect the FortiGate-5001E front panel 1 and 2 interfaces to a 40Gbps network. The QSFP+ transceivers are inserted into cage sockets numbered 1 and 2 on the FortiGate-5001E front panel. You can install the QSFP+ transceivers before or after inserting the FortiGate-5001E into a chassis. You can split front panel interfaces 1 and 2 into four  10GBASE-SR interfaces by installing 40GBASE-SR10 multimode QSFP+ transceiver. You must install SR SFP+ transceivers for normal operation of the FortiGate-5001E front panel 3 and 4 interfaces. The FortiGate-5001E ships with two SR SFP+ transceivers. You can also configure the 3 and 4 interfaces to operate at 1Gbps and install SFP transceivers. You can install the transceivers before or after inserting the FortiGate-5001E into a chassis. You can install the following types of transceivers for connectors 3 and 4: l SFP+ SR (10Gbps) l SFP+ LR (10Gbps ) l SFP (1Gbps) To install QSFP+, SFP+ or SFP transceivers To complete this procedure, you need: l A FortiGate-5001E l QSFP+, SFP+ or SFP transceivers l An electrostatic discharge (ESD) preventive wrist or ankle strap with connection cord FortiGate-5001Es must be protected from static discharge and physical shock. Only handle or work with FortiGate-5001Es at a static-free workstation. Always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate-5001Es. Handling the QSFP+, SFP+ and SFP transceivers by holding the release latch can damage the connector. Do not force transceivers into their cage slots. If the transceiver does not easily slide in and click into place, it may not be aligned correctly. If this happens, remove the transceiver, realign it and slide it in again. 1. Attach the ESD wrist strap to your wrist and to an available ESD socket or wrist strap terminal. 2. Remove the caps from the cage sockets on the FortiGate-5001E front panel. FortiGate-5001E System Guide 14
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
14
Hardware installation Fortinet Technologies Inc. 3. Hold the sides of the transceiver and slide it into the cage socket until it clicks into place. Changing the FortiGate-5001E SW6 switch settings FortiGate-5001Es must be protected from static discharge and physical shock. Only handle or work with FortiGate-5001Es at a static-free workstation. Always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate-5001Es. You can set the SW6 switch on the FortiGate-5001E to operate the FortiGate-5001E in standalone mode (without a shelf manager) or in normal mode in a chassis with a shelf manager. Fortinet factory sets the switch  for normal mode; allowing you to install the FortiGate-5001E in a chassis with an operating shelf manager (such as a FortiGate-5144C chassis). The top of the FortiGate-5001E is covered with a metal panel. The printed circuit board is under the metal panel. SW6 is located on the area of the printed circuit board that extends from the back side of the FortiGate-5001E as shown in the following diagram. Location of SW6 on the FortiGate-5001E circuit board Front Faceplate Normal Mode (Factory Default) ON SW 3 421 ON SW6 21 3 4 ON SW6 21 3 4 Standalone Mode (No Shelf Manager) Location of SW6 FortiGate-5001E System Guide 15
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
15
Hardware installation Fortinet Technologies Inc. SW6 factory default normal mode (shelf-manager mode) setting Normal Mode (Factory Default) ON SW6 21 3 4 A FortiGate-5001E set to normal mode (the default setting) can be installed into an ATCA chassis (such as a FortiGate￾5144C chassis) with a shelf manager. By default a FortiGate-5001E will not start up if installed in a chassis that does not contain a shelf manager or that contains a shelf manager that is not operating.To operate a FortiGate-5001E in a chassis that does not contain an operating shelf manager, you must change the SW6 switch setting to standalone mode: SW6 standalone mode setting ON SW6 21 3 4 Standalone Mode (No Shelf Manager) In all cases you should confirm that you have the correct SW6 setting before installing the FortiGate-5001E in a chassis. FortiGate-5001E SW6 settings Chassis Correct SW6 setting Results of incorrect SW6 set￾ting FortiGate-5144C or ATCA chassis with a compatible operating shelf manager. ON SW6 21 3 4 Shelf manager cannot find the FortiGate-5001E. No shelf manager information about the FortiGate-5001E available. Any ATCA chassis without an operating shelf manager. ON SW6 21 3 4 FortiGate-5001E will not start up. If the shelf manager in a FortiGate-5000 series chassis is missing or not functioning, FortiGate-5001Es with factory default SW6 settings will not start up. Changing or verifying the SW6 switch setting To complete this procedure, you need: l A FortiGate-5001E. l A tool for changing the SW6 switch setting (optional). l An electrostatic discharge (ESD) wrist strap with connection cord. FortiGate-5001Es must be protected from static discharge and physical shock. Make sure to handle or work with FortiGate-5001Es at a static-free workstation or always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate-5001Es. FortiGate-5001E System Guide 16
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
16
Hardware installation Fortinet Technologies Inc. 1. Attach the ESD wrist strap to your wrist and to an available ESD socket or wrist strap terminal. 2. If you have installed the FortiGate-5001E in a chassis, remove it. For removal instructions, see Shutting down and Removing a FortiGate-5001E on page 21. 3. Locate the SW6 switch on the FortiGate-5001E. 4. If required, change the SW6 switch to the correct setting. 5. Insert the FortiGate-5001E into a chassis and verify that it starts up and operates correctly. For inserting instructions, see Inserting a FortiGate-5001E board into a chassis on page 18. FortiGate-5001E mounting components To install a FortiGate-5001E you slide the board into a hub/switch slot in the front of an ATCA chassis (usually slot 3 plus) and then use the mounting components to lock the board into place in the slot. When locked into place and positioned correctly the board front panel is flush with the chassis front panel. The board is also connected to the chassis backplane. FortiGate-5001Es are vertical when inserted into a FortiGate-5144C chassis, but you also often see the board on a horizontal surface or horizontally in an illustration. Because of this, the descriptions in this document refer to left (top) and right (bottom) mounting components. To position the board correctly you must use the mounting components shown below for the right (bottom) of the FortiGate-5001E front panel. The mounting components on the left (top) of the front panel are the same but reversed. The FortiGate-5001E mounting components align the board in the chassis slot and are used to insert and eject the board from the slot. FortiGate-5001E System Guide 17
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
17
Hardware installation Fortinet Technologies Inc. Closed Open Alignment Pin Retention Screw Lock Handle Alignment Pin Retention Screw Lock Handle Handle Hook Alignment Pin Retention Screw Lock Hook Alignment Pin Retention Screw Lock Handle The FortiGate-5001E handles align the board in the chassis slot and are used to insert and eject the board from the slot. The right (bottom) handle activates a microswitch that turns on or turns off power to the board. When the right (bottom) handle is open the microswitch is off and the board cannot receive power. When the right (bottom) handle is fully closed the microswitch is on and if the board is fully inserted into a chassis slot the board can receive power. Inserting a FortiGate-5001E board into a chassis The FortiGate-5001E must be fully installed in a chassis slot (usually slot 3 plus), with the handles closed and locked and retention screws fully tightened for the FortiGate-5001E to receive power and operate normally. If the FortiGate-5001E is not receiving power, the HS LED glows solid blue and all other LEDs remain off. It is important to carefully seat the FortiGate-5001E all the way into the chassis, to not use too much force on the handles, and to make sure that the handles are properly locked. Only then will the FortiGate-5001E power-on and start up correctly. FortiGate-5001Es are hot swappable. The procedure for inserting a FortiGate-5001E into a chassis slot is the same whether or not the chassis is powered on. FortiGate-5001E System Guide 18
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
18
Hardware installation Fortinet Technologies Inc. To insert a FortiGate-5001E into a chassis slot Do not carry the FortiGate-5001E by holding the handles or retention screws. When inserting or removing the FortiGate-5001E from a chassis slot, handle the board by the front panel. The handles are not designed for carrying the board. If the handles become bent or damaged the FortiGate-5001E may not align correctly in the chassis slot. To complete this procedure, you need: l A FortiGate-5001E l An ATCA chassis with an empty hub/switch slot l An electrostatic discharge (ESD) preventive wrist strap with connection cord FortiGate-5001Es must be protected from static discharge and physical shock. Make sure to handle or work with FortiGate-5001Es at a static-free workstation or always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate-5001Es. 1. Attach the ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the chassis or frame. 2. If required, remove the protective metal frame that the FortiGate-5001E has been shipped in. 3. Insert the FortiGate-5001E into the empty slot in the chassis. 4. Unlock the handles by squeezing the handle locks. Unlock Handle 5. Open the handles to their fully open positions. To avoid damaging the lock, make sure you squeeze the handles fully to unlock them before opening. The handles should pop easily out of the board front panel FortiGate-5001E System Guide 19
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
19
Hardware installation Fortinet Technologies Inc. Handle Alignment Pin Open Alignment Pin Lock Handle 6. Carefully guide the FortiGate-5001E into the chassis using the rails in the slot. Insert the FortiGate-5001E by applying moderate force to the front faceplate (not the handles) to slide the board into the slot. The board should glide smoothly into the chassis slot. If you encounter any resistance while sliding the board in, the board could be aligned incorrectly. Pull the board back out and try inserting it again. 7. Slide the board in until the alignment pins are inserted half way into their sockets in the chassis. 8. Turn both handles to their fully-closed positions. The handles should hook into the sides of the chassis slot. Closing the handles draws the  board into position in the chassis slot and into full contact with the chassis backplane. The board front panel should be in contact with the chassis front panel. When the handles are fully-closed they lock into place. As the right (bottom) handle closes the microswitch is turned on, supplying power to the board. If the chassis is powered on the HS LED starts flashing blue. If the board is aligned correctly, inserted all the way into the slot, and the right (bottom) handle is properly closed the HS LED flashes blue for a few seconds. At the same time the ACC LEDs turn green. After a few seconds the HS LED goes out and the FortiGate-5001E firmware starts up. If the board is operating correctly, the front panel LEDs are lit as described below. If the board has not been inserted properly the HS LED changes to solid blue and all other LEDS turn off. If this occurs, open the handles, slide the board part way out, and repeat the insertion process. 9. Once the board is inserted correctly, fully tighten the retention screws to lock the FortiGate-5001E into position in the chassis slot. Tighten Retention Screw FortiGate-5001E System Guide 20
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
20
Hardware installation Fortinet Technologies Inc. FortiGate-5001E normal operating LEDs LED State OOS Off PWR Green STA Off ACC Off (Or flashing green when the system accesses the FortiController-5903C flash disk.) IPM Off Shutting down and Removing a FortiGate-5001E To avoid potential hardware problems, always shut down the FortiGate-5001E operating system properly before removing the FortiGate-5001E from a chassis slot or before powering down the chassis. The following procedure describes how to correctly use the FortiGate-5001E mounting components  to remove a FortiGate-5001E from an ATCA chassis slot. FortiGate-5001E are hot swappable. The procedure for removing a FortiGate-5001E from a chassis slot is the same whether or not the chassis is powered on. To remove a FortiGate-5001E from a chassis slot Do not carry the FortiGate-5001E by holding the handles or retention screws. When inserting or removing the FortiGate-5001E from a chassis slot, handle the board by the front panel. The handles are not designed for carrying the board. If the handles become bent or damaged the FortiGate-5001E may not align correctly in the chassis slot. To complete this procedure, you need: l An ATCA chassis with a FortiGate-5001E  installed l An electrostatic discharge (ESD) preventive wrist strap with connection cord FortiGate-5001Es must be protected from static discharge and physical shock. Make sure to handle or work with FortiGate-5001Es at a static-free workstation or always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate-5001Es. 1. Attach the ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the chassis or frame. 2. Disconnect all cables from the FortiGate-5001E, including all network cables and the console cable. 3. Fully loosen the FortiGate-5001E retention screws. FortiGate-5001E System Guide 21
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
21
Hardware installation Fortinet Technologies Inc. Loosen Retention Screw 4. Unlock the handles by squeezing the handle locks. 5. Slowly open both handles a small amount (about 8 degrees) until the IPM LED flashes blue. 6. Keep the handles in this position until the IPM LED stops flashing and becomes solid blue. Waiting for the IPM LED to change to solid blue makes sure that the board software shutdowns completely before disconnecting it from backplane power. 7. Open the handles to their fully open positions. Opening the handles turns off the microswitch, turns off all LEDs, and ejects the board from the chassis slot. You need to use moderate pressure on the handles to eject the board. To avoid damaging the lock, make sure you squeeze the handles fully to unlock them before opening. The handles should pop easily out of the board front panel. . Handle Alignment Pin Open Alignment Pin Lock Handle 8. Pull the board about half way out. 9. Turn both handles to their fully-closed positions. When the handles are fully-closed they lock into place. FortiGate-5001E System Guide 22
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
22
Hardware installation Fortinet Technologies Inc. Fully Closed and Locked Alignment Pin Handle Close Alignment Pin Handle 10. Carefully slide the board completely out of the slot. 11. Re-attach the protective metal frame if you are going ship the FortiGate-5001E or store it outside of a chassis. Resetting a FortiGate-5001E You can use the following procedure to reset a FortiGate-5001E without removing it from the chassis. You do not have to loosen the retention screws or adjust the position of the FortiGate-5001E to use this procedure. To complete this procedure, you need: l An ATCA chassis with a FortiGate-5001E installed l An electrostatic discharge (ESD) preventive wrist strap with connection cord FortiGate-5001Es must be protected from static discharge and physical shock. Make sure to handle or work with FortiGate-5001Es at a static-free workstation or always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate-5001Es. 1. Attach the ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the chassis or frame. 2. Unlock the right handle by squeezing the handle lock. Unlock Handle 3. Pivot the right handle open. The handle can only pivot a short distance. Pivoting the right handle turns off the microswitch which powers down the board, turning off all LEDs except the IPM LED which turns on. FortiGate-5001E System Guide 23
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
23
Hardware installation Fortinet Technologies Inc. 4. After 10 seconds snap the right handle back into place. 5. The board powers up, the LEDs light and in a few minutes the FortiGate-5001E operates normally. Troubleshooting This section describes some common troubleshooting topics: FortiGate-5001E does not startup Positioning of FortiGate-5001E handles and a few other causes may prevent a FortiGate-5001E from starting up correctly. Chassis with a shelf manager: no communication with shelf manager If the FortiGate-5001E is receiving power and the handles are fully closed and the FortiGate-5001E still does not start up, the problem could be that the FortiGate-5001E cannot communicate with the chassis shelf manager. This problem can only occur in an ATCA chassis that contains a shelf manager. To correct this problem power down and then restart the chassis. If you are operating a FortiGate-5000 series chassis you can power down and then restart the chassis without removing FortiGate-5000 series components. All chassis: handles not fully closed If the handles are damaged or positioned incorrectly the FortiGate-5001E will not start up. Make sure the handles are correctly aligned, fully inserted and locked. All chassis: Firmware problem If the FortiGate-5001E is receiving power and the handles are fully closed, and you have restarted the chassis and the FortiGate-5001E still does not start up, the problem could be with FortiOS. Connect to the FortiGate-5001E console and try cycling the power to the board. If the BIOS starts up, interrupt the BIOS startup and install a new firmware image. If this does not solve the problem, contact Fortinet Technical Support. FortiGate-5001E status LED is flashing during system operation Normally, the FortiGate-5001E Status LED is off when the FortiGate-5001E is operating normally. If this LED starts flashing while the board is operating, a fault condition may exist. At the same time the FortiGate-5001E may stop processing traffic. To resolve the problem you can try removing and reinserting the FortiGate-5001E in the chassis slot. Reloading the firmware may also help. If this does not solve the problem there may have been a hardware failure or other problem. Contact Fortinet Technical Support for assistance. FortiGate-5001E System Guide 24
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
24
Hardware installation Fortinet Technologies Inc. Fabric backplane communication speed compatibility To make sure the FortiGate-5001E can successfully communicate with the fabric backplane you should make sure the fabric backplane interfaces are set to the correct speed for the chassis and the backplane switching device. Do not set the FortiGate-5001E fabric backplane interfaces to auto negotiate. In most cases this setting will cause interruptions or compatibility issues. This applies to fabric backplane interfaces fabric1 and fabric2 as well as any VLANs added to these interfaces. For example, SLBC configurations include interfaces such as elbc-ctrl/1 and elbc-ctrl/2 that must be able to connect to the fabric backplane. For example, if the FortiGate-5001E is installed in a FortiGate-5144C chassis with a 40-Gbyte backplane  the FortiGate￾5001E fabric backplane interfaces should be set to 40000full: config system interface edit fabric1 set speed 40000full next edit fabric2 set speed 40000full next edit elbc-ctrl/1 set speed 40000full next edit elbc-ctrl/2 set speed 40000full end If the FortiGate-5001E is installed in a chassis with a 10-gbyte backplane (such as the FortiGate-5060 or 5140B)  the FortiGate-5001E fabric backplane interfaces should be set to 10000full: config system interface edit fabric1 set speed 10000full next edit fabric2 set speed 10000full next edit elbc-ctrl/1 set speed 10000full next edit elbc-ctrl/2 set speed 10000full end FortiGate-5001E System Guide 25
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
25
FortiGate-5001E quick configuration guide Fortinet Technologies Inc. FortiGate-5001E quick configuration guide This section is a quick start guide to connecting and configuring a FortiGate-5001E security system for your network. Before using this chapter, your FortiGate-5000 series or compatible ATCA chassis should be mounted and connected to your power system. In addition, your FortiGate-5001E should be inserted into the chassis and QSFP+ or SFP+ transceivers should be installed. The FortiGate-5001E should also be powered up and the front panel LEDs should indicate that the board is functioning normally. Registering your FortiGate-5001E Register your FortiGate-5001E to receive Fortinet customer services such as product updates and customer support. You must also register your product for FortiGuard services. Register your product by visiting https://support.fortinet.com. To register, enter your contact information and the serial numbers of the Fortinet products that you or your organization have purchased. Planning the configuration Before beginning to configure your FortiGate-5001E security system, you need to plan how to integrate the cluster into your network. In NAT/Route mode, the FortiGate-5001E security system is visible to the networks that it is connected to. Each interface connected to a network must be configured with an IP address that is valid for that network. In many configurations, in NAT/Route mode all of the FortiGate interfaces are on different networks, and each network is on a separate subnet. You would typically use NAT/Route mode when the FortiGate-5001E security system is deployed as a gateway between private and public networks. In the default NAT/Route mode configuration, the FortiGate-5001E security system functions as a firewall. Firewall policies control communications through the FortiGate-5001E security system. No traffic can pass through the FortiGate-5001E security system until you add firewall policies. In NAT/Route mode, firewall policies can operate in NAT mode or in Route mode. In NAT mode, the firewall performs network address translation before IP packets are sent to the destination network. In Route mode, no translation takes place. FortiGate-5001E System Guide 26
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
26
FortiGate-5001E quick configuration guide Fortinet Technologies Inc. FortiGate-5001E in NAT/Route mode port1 192.168.1.2 port2 204.23.1.2 Internal network NAT mode policies controlling traffic between internal and external networks Choosing the configuration tool You can use either the GUI or the Command Line Interface (CLI) to configure the FortiGate-5001E. Some basic configuration settings can only be done from the CLI. You can connect to the GUI by connecting to mgmt1 using HTTP or HTTPS. You can connect to the CLI by connecting to mgmt1 using SSH or Telent or by a direct console connection to the FortiGate-5001E Console port. Use a terminal emulator with the following settings to connect to the console port: bits per second: 9600, data bits: 8, parity: none, stop bits: 1, flow control: none. Factory default settings The FortiGate-5001E ships with the following factory default configuration. Option Default Configuration Administrator Account User Name admin Password (none) mgmt1 IP/Netmask 192.168.1.99/24 mgmt2 IP/Netmask 192.168.100.99/24 FortiGate-5001E System Guide 27
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
27
FortiGate-5001E quick configuration guide Fortinet Technologies Inc. Option Default Configuration Default route Gateway 192.168.100.1 Device mgmt2 At any time during the configuration process, if you run into problems, you can reset the FortiGate-5001E to the factory defaults and start over. From the CLI enter execute factoryreset. Basic GUI configuration Use the following steps to set up a basic configuration. 1. Connect to the FortiGate-5001E mgmt1 interface by browsing to  https://192.168.1.99. 2. Type admin in the Name field and select Login. 3. Change the admin administrator password by going to System > Administrators. 4. Edit the admin administrator and select Change Password to add a pasword. 5. To configure interfaces go to  Network > Interfaces and edit each interface to configure. 6. To configure DNS setting go to Network > DNS. 7. To configure the Default Gateway go to Network > Static Routes and Edit the static route with destination 0.0.0.0/0. Basic CLI configuration Use the following steps to set up a basic configuration. Use the serial cable supplied with your FortiGate-5001E to connect the FortiGate-5001E Console port or use SSH to connect to the mgmt1 interface CLI. At the Login: prompt, type admin and press Enter twice (no password required). Change the administrator password. config system admin edit admin set password <password> end Configure the mgmt1, port1, and port1 interfaces. config system interface edit mgmt1 set ip <intf_ip>/<netmask_ip> next edit port1 set ip <intf_ip>/<netmask_ip> next edit port2 set ip <intf_ip>/<netmask_ip> end FortiGate-5001E System Guide 28
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
28
FortiGate-5001E quick configuration guide Fortinet Technologies Inc. Configure the primary and secondary DNS server IP addresses.. config system dns set primary <dns-server_ip> set secondary <dns-server_ip> end Configure the default gateway. config router static edit 1 set device <interface_name> set gateway <gateway_ip> end Upgrading FortiGate-5001E firmware Fortinet periodically updates the FortiGate-5001E FortiOS firmware to include enhancements and address issues. After you have registered your FortiGate-5001E security system you can download FortiGate-5001E firmware from the support web site https://support.fortinet.com. Only FortiGate-5001E administrators (whose access profiles contain system read and write privileges) and the FortiGate-5001E admin user can change the FortiGate-5001E firmware. 1. Copy the firmware image file to your management computer. 2. Log into the GUI as the admin administrator. 3. From the System Information widget, select Update beside Firmware Version. 4. Select Upload Firmware, select the firmware image file that you downloaded. The FortiGate-5001E uploads the firmware image file, upgrades to the new firmware version, restarts, and displays the FortiGate-5001E login. This process takes a few minutes. 5. Log into the GUI. 6. Check the Firmware Version on the System Information widget to confirm the firmware upgrade is successfully installed. 7. Update the FortiGate-5001E antivirus and attack definitions. FortiGate-5001E fabric and base backplane communication By default the fabric and base backplane interfaces are not enabled. Once they are enabled you can operate and configure them in the same way as any FortiGate-5001E interfaces. Normally the fabric interfaces are used for data communication and the base interfaces are used for  FGCP HA heartbeat communication. Although not recommended, you can use base backplane interfaces for data and HA heartbeat communication at the same time. FortiGate-5001E fabric and base backplane communication requires a FortiSwitch or FortiController in switch mode installed in chassis slots 1 or 2. A FortiSwitch or FortiController in chassis slot 1 provides fabric communication on the fabric1 interface and base communication on the base1 interface. A FortiSwitch or FortiController installed in chassis slot 2 provides communication on the fabric2 and base2 interfaces. Enter the following command to enable backplane data communication: config system global FortiGate-5001E System Guide 29
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
29
FortiGate-5001E quick configuration guide Fortinet Technologies Inc. set show-backplane-intf enable end The fabric1, fabric2, base1 and base2 interfaces now appear in all Interface lists. You can now configure the base backplane interfaces and add routes, firewall policies and other configuration settings using these interfaces. On some chassis and with some hardware you may also have to change the fabric backplane interface speeds. Use the following command to do this: To set the speed to be compatible with a 40-gbyte backplane: config system interface edit fabric1 set speed 40000full next edit fabric2 set speed 40000full end To set the speed to be compatible with a 10-gbyte backplane: config system interface edit fabric1 set speed 10000full next edit fabric2 set speed 10000full end FortiGate-5001E System Guide 30
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
30
Cautions and Warnings Fortinet Technologies Inc. Cautions and Warnings Environmental Specifications Rack Mount Instructions - The following or similar rack-mount instructions are included with the installation instructions: Instructions de montage en rack - Les instructions de montage en rack suivantes ou similaires sont incluses avec les instructions d'installation: Elevated Operating Ambient - If installed in a closed or multi-unit rack assembly, the operating ambient temperature of the rack environment may be greater than room ambient. Therefore, consideration should be given to installing the equipment in an environment compatible with the maximum ambient temperature (Tma) specified by the manufacturer. Température ambiante élevée – S'il est installé dans un rack fermé ou à unités multiples, la température ambiante de fonctionnement de l'environnement du rack peut être supérieure à la température ambiante de la pièce. Par conséquent, il est important d’installer le matériel dans un environnement respectant la température ambiante maximale (Tma) stipulée par le fabricant. Reduced Air Flow - Installation of the equipment in a rack should be such that the amount of air flow required for safe operation of the equipment is not compromised. Ventilation réduite – Installation de l'équipement dans un rack doit être telle que la quantité de flux d'air nécessaire au bon fonctionnement de l'équipement n'est pas compromise. Mechanical Loading - Mounting of the equipment in the rack should be such that a hazardous condition is not achieved due to uneven mechanical loading. Chargement Mécanique – Montage de l'équipement dans le rack doit être telle qu'une situation dangereuse n'est pas lié à un chargement mécanique inégal. Circuit Overloading - Consideration should be given to the connection of the equipment to the supply circuit and the effect that overloading of the circuits might have on overcurrent protection and supply wiring. Appropriate consideration of equipment nameplate ratings should be used when addressing this concern. Surtension – Il convient de prendre l’ensemble des précautions nécessaires lors du branchement de l’équipement au circuit d’alimentation et être particulièrement attentif aux effets de la suralimentation sur le dispositif assurant une protection contre les courts-circuits et le câblage. Ainsi, il est recommandé de tenir compte du numéro d’identification de l’équipement. Reliable Earthing - Reliable earthing of rack-mounted equipment should be maintained. Particular attention should be given to supply connections other than direct connections to the branch circuit (e.g. use of power strips). Fiabilité de la mise à la terre – Fiabilité de la mise à la terre de l'équipement monté en rack doit être maintenue. Une attention particulière devrait être accordée aux connexions d'alimentation autres que les connexions directes au circuit de dérivation (par exemple de l'utilisation de bandes de puissance). FortiGate-5001E System Guide 31
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
31
Cautions and Warnings Fortinet Technologies Inc. Blade Carriers, Cards and Modems must be Listed Accessories or Switch, Processor, Carrier and similar blades or cards should be UL Listed or Equivalent. Serveur-blades, cartes et modems doivent être des accessoires listés ou commutateurs, processeurs, serveurs et similaire blades ou cartes doivent être listé UL ou équivalent. Refer to specific Product Model Data Sheet for Environmental Specifications (Operating Temperature, Storage Temperature, Humidity, and Altitude). Référez à la Fiche Technique de ce produit pour les caractéristiques environnementales (Température de fonctionnement, température de stockage, humidité et l'altitude). Safety Moving parts — Hazardous moving parts. Keep away from moving fan blades. Pièces mobiles – Pièces mobiles dangereuses. Se tenir éloigné des lames mobiles du ventilateur. Warning:  Equipment intended for installation in Restricted Access Location. Avertissement: Le matériel est conçu pour être installé dans un endroit où l’accès est restreint. Warning:  A readily accessible disconnect device shall be incorporated in the building installation wiring. Avertissement: Un dispositif de déconnexion facilement accessible doit être incorporé dans l'installation électrique du bâtiment. Battery  – Risk of explosion if the battery is replaced by an incorrect type. Do not dispose of batteries in a fire. They may explode. Dispose of used batteries according to your local regulations. IMPORTANT: Switzerland: Annex 4.10 of SR814.013 applies to batteries. Batterie  – Risque d'explosion si la batterie est remplacée par un type incorrect. Ne jetez pas les batteries au feu. Ils peuvent exploser. Jetez les piles usagées conformément aux réglementations locales. IMPORTANT: Suisse: l'annexe 4.10 de SR814.013 s’appliquent aux batteries. 警告 本電池如果更換不正確會有爆炸的危險 請依製造商說明書處理用過之電池 Caution:  Disconnect power supply cords before servicing Attention: Débranchez les cordons de la source d’alimentation avant tout entretien. Grounding — To prevent damage to your equipment, connections that enter from outside the building should pass through a lightning / surge protector, and be properly grounded. Use an electrostatic discharge workstation (ESD) and/or wear an anti-static wrist strap while you work. In addition to the grounding terminal of the plug, on the back panel, there is another, separate terminal for earthing. FortiGate-5001E System Guide 32
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
32
Cautions and Warnings Fortinet Technologies Inc. Mise à la terre — Pour éviter d’endommager votre matériel, assurez-vous que les branchements qui entrent à partir de l’extérieur du bâtiment passent par un parafoudre / parasurtenseur et sont correctement mis à la terre. Utilisez un poste de travail de décharge électrostatique (ESD) et / ou portez un bracelet anti-statique lorsque vous travaillez. Ce produit possède une borne de mise à la terre qui est prévu à l’arrière du produit, à ceci s’ajoute la mise à la terre de la prise. This product has a separate protective earthing terminal provided on the back of the product in addition to the grounding terminal of the attachment plug.  This separate protective earthing terminal must be permanently connected to earth with a green with yellow stripe conductor minimum size # 6 AWG and the connection is to be installed by a qualified service personnel. Ce produit a une borne de mise à la terre séparé sur le dos de l'appareil, en plus de la borne de mise à la terre de la fiche de raccordement. Cette borne de mise à la terre séparée doit être connecté en permanence à la terre avec un conducteur vert avec la taille bande jaune de minimum # 6 AWG et la connexion doit être installé par un personnel qualifié. Caution: Slide/rail mounted equipment is not to be used as a shelf or a work space. Attention: Un équipement monté sur bâti ne doit pas être utilisé sur une étagère ou dans un espace de travail. Fiber optic transceiver must be rated 3.3V, 22mA max, Laser Class 1, UL certified component. Le transceiver optique doit avoir les valeurs nominales de 3.3 V, maximum 22 mA, Laser Class 1, homologué UL. FortiGate-5001E System Guide 33
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
33
Regulatory Notices Fortinet Technologies Inc. Regulatory Notices Federal Communication Commission (FCC) – USA This device complies with Part 15 of FCC Rules. Operation is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received; including interference that may cause undesired operation. This equipment has been tested and found to comply with the limits for a Class A digital device, pursuant to Part 15 of the FCC Rules. These limits are designed to provide reasonable protection against harmful interference when the equipment is operated in a commercial environment. This equipment generates, uses, and can radiate radio frequency energy, and if it is not installed and used in accordance with the instruction manual, it may cause harmful interference to radio communications. Operation of this equipment in a residential area is likely to cause harmful interference, in which case the user will be required to correct the interference at his own expense. WARNING: Any changes or modifications to this product not expressly approved by the party responsible for compliance could void the user’s authority to operate the equipment. Industry Canada Equipment Standard for Digital Equipment (ICES) – Canada CAN ICES-3 (A) / NMB-3 (A) This digital apparatus does not exceed the Class A limits for radio noise emissions from digital apparatus set out in the Radio Interference Regulations of the Canadian Department of Communications. Cet appareil numérique n’émet pas de bruits radioélectriques dépassant les limites applicables aux appareils numériques de la classe A prescrites dans le Règlement sur le brouillage radioélectrique édicte par le ministère des Communications du Canada. European Conformity (CE) - EU This is a Class A product. In a domestic environment, this product may cause radio interference, in which case the user may be required to take adequate measures. FortiGate-5001E System Guide 34
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
34
Regulatory Notices Fortinet Technologies Inc. Voluntary Control Council for Interference (VCCI) – Japan この装置は、クラスA情報技術装置です。この装置を家庭環境で使用すると電波妨害を引き起こすことがあります。この場 合には使用者が適切な対策を講ずるよう要求されることがあります。VCCI-A Product Safety Electrical Appliance & Material (PSE) – Japan 日本では電気用品安全法(PSE)の規定により、同梱している電源コードは本製品の専用電源コードとして利用し、他の製 品に使用しないでください。 Bureau of Standards Metrology and Inspection (BSMI) – Taiwan 這是甲類的資訊產品,在居住的環境中使用時,可能會造成射頻干擾,在這種情況下,使用者會被要求採取某些 適當的對策。 China 此为A级产品,在生活环境中,该产品可能会造成无线电干扰。这种情况下,可能需要用户对其采取切实可行的 措施。 FortiGate-5001E System Guide 35
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
35
Regulatory Notices Fortinet Technologies Inc. FortiGate-5001E System Guide 36
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
36
Copyright© 2021 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/7b72a53e-1a0a-11e9-9685-f8bc1258b856/fortigate-5001E-security-system-guide.pdf
0
FortiGate 6000F Series System Guide FortiGate 6000F Series
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
1
FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO LIBRARY https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/training-certification FORTINET TRAINING INSTITUTE https://training.fortinet.com FORTIGUARD LABS https://www.fortiguard.com END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: techdoc@fortinet.com October 23, 2024 FortiGate 6000F Series 7.0.12 System Guide 01-7012-464766-20241023
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
2
TABLE OF CONTENTS Change log 5 FortiGate 6000F series hardware description 7 FortiGate 6001F model licensing 8 Applying your FortiGate 6001F FPC subscription license 8 Activating your FortiGate 6001F FPC perpetual license 9 Verifying your FortiGate 6001F FPC subscription and perpetual licenses 9 What to expect when your subscription license expires 9 Front panel interfaces 10 Interface groups and changing data interface speeds 10 Front panel LEDs 11 Front panel connectors 12 Console port 13 Connecting to the CLI of an individual FPC 14 NMI switch and NMI reset commands 15 FortiGate 6000F series back panel 15 FortiGate 6000F series schematic 16 FortiGate 6000F series hardware information 17 Shipping components 17 Optional accessories and replacement parts 18 Physical description of the FortiGate 6000F 18 FortiGate 6000F series hardware generations 19 Cooling fan trays 19 FortiGate 6000F AC power supply units (PSUs) 20 Connecting generation 2 FortiGate 6000F PSUs to high line AC power 21 Connecting generation 1 or 2 FortiGate 6000F PSUs to low line AC power 22 AC PSU LED states 22 Connecting FortiGate 6000F PSUs to AC power 23 Hot swapping an AC PSU 23 DC PSUs and supplying DC power to a FortiGate 6000F 24 DC PSU LED States 25 Crimping guidelines 25 Connecting a FortiGate 6000F DC PSU to DC power 26 Hot Swapping a DC PSU 27 Connecting the FortiGate 6000F to ground 27 FortiGate 6000F hardware assembly and rack mounting 29 Cautions and warnings 29 Cooling air flow and required minimum air flow clearance 29 FortiGate 6000F four post rack-mount installation 30 Installation steps 30 Sliding the FortiGate 6000F into the rack 32 Removing the FortiGate 6000F from a four-post rack 34 Surface-mount installation 35 Installing QSFP28, SFP28, SFP+, and SFP transceivers 35 FortiGate 6000F Series System Guide 3 Fortinet Technologies Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
3
Fortinet Technologies Inc. To install transceivers 36 Getting started with FortiGate 6000F series 37 Confirming startup status 38 Default VDOM configuration and configuring the management interfaces 39 Changing data interface network settings 39 Resetting to factory defaults 39 Restarting the FortiGate 6000F 39 Changing the FortiGate 6001F, FortiGate 6501F, or FortiGate 6301F log disk and RAID configuration 40 Managing individual FortiGate 6000F management boards and FPCs 41 Special management port numbers 41 HA mode special management port numbers 42 Connecting to individual FPC consoles 43 Connecting to individual FPC CLIs 44 Performing other operations on individual FPCs 44 Firmware upgrades 45 Firmware upgrade basics 45 Installing firmware on an individual FPC 46 Installing firmware from the BIOS after a reboot 48 Synchronizing the FPCs with the management board 49 Decommissioning a FortiGate 6000F 51 Before you begin 51 Decommissioning steps 55 Disable and erase the comlog (SMC-LAN-interface) 56 Securely erase and overwrite each FPC’s system flash 58 Erase the log disks (FortiGate 6001F, FortiGate 6301F, and FortiGate 6501F only) 60 Erase the management board system flash 61 Final decommissioning of the log disks (optional) 64 Cautions and warnings 65 Environmental specifications 65 Safety 66 Regulatory notices 68 Federal Communication Commission (FCC) – USA 68 Industry Canada Equipment Standard for Digital Equipment (ICES) – Canada 68 European Conformity (CE) - EU 68 Voluntary Control Council for Interference (VCCI) – Japan 69 Product Safety Electrical Appliance & Material (PSE) – Japan 69 Bureau of Standards Metrology and Inspection (BSMI) – Taiwan 69 China 69 Agência Nacional de Telecomunicações (ANATEL) – Brazil 70 Korea Certification (KC) – Korea 70 FortiGate 6000F Series System Guide 4
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
4
Change log Fortinet Technologies Inc. Change log Date Change description October 23, 2024 New section: Decommissioning a FortiGate 6000F on page 51. More information added about the FortiGate 6001F and how FortiGate 6001F licensing works. See FortiGate 6001F model licensing on page 8. The execute load-balance update and the execute load-balance load￾backup-image commands were removed from the FortiGate 6000F for FortiOS 7.4.0. All references to these commands have been removed from this document. The section Installing firmware on an individual FPC on page 46 has been updated to describe how to install firmware on an individual FPC from the FPC BIOS. October 6, 2023 Added information about the FortiGate 6001F, a new FortiGate 6000F series model that includes a total of ten FPCs, by default three of them are active. To increase throughput you can purchase perpetual or subscription licenses for each of the additional seven FPCs for a total of ten, see: l FortiGate 6000F series hardware description on page 7. l FortiGate 6001F model licensing on page 8. l FortiGate 6000F series schematic on page 16. l FortiGate 6000F series hardware generations on page 19. March 28, 2023 Removed the Supported transceivers section. See the FortiGate 6000F datasheet or contact Fortinet for current information about supported transceivers. August 17, 2022 Added information about what happens to the RAID configuration of a FortiGate 6301F or 6501F after installing firmware from the BIOS. See Installing firmware from the BIOS after a reboot on page 48. December 22, 2021 Added links to information about grounding the FortiGate 6000F to AC and DC power sections. July 15, 2021 Corrections and additions to Regulatory notices on page 68. May 13, 2021 Added information about FortiGate 6000F DC models. l The DC models are listed here FortiGate 6000F series hardware description on page 7. l Details about DC power are here: DC PSUs and supplying DC power to a FortiGate 6000F on page 24. January 21, 2021 Added information about FortiGate 6000F hardware generation 1 and generation 2, see FortiGate 6000F series hardware generations on page 19. January 14, 2021 Updates and corrections to FortiGate 6000F AC power supply units (PSUs) on page 20. Removed DC power content that was added incorrectly. December 23, 2020 The section FortiGate 6000F AC power supply units (PSUs) on page 20 has been updated for the FortiGate 6000F generation 2. The new section Connecting generation 1 or 2 FortiGate 6000F PSUs to low line AC power on page 22 describes FortiGate 6000F generation 1 AC PSUs. FortiGate 6000F Series System Guide 5
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
5
Change log Fortinet Technologies Inc. Date Change description September 2, 2020 More information about FPC failure with power loss added to FortiGate 6000F AC power supply units (PSUs) on page 20. April 13, 2020 Updated Console port on page 13 and Shipping components on page 17 to include the USB to RJ-45 console cable. Other minor changes. October 25, 2019 Misc. fixes. October 18, 2019 Misc. fixes. October 11, 2019 New information added to: Console port on page 13 and FortiGate 6000F four post rack-mount installation on page 30. Corrections to FortiGate 6000F series back panel on page 15 and FortiGate 6000F AC power supply units (PSUs) on page 20. FortiGate 6000F Series System Guide 6
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
6
FortiGate 6000F series hardware description Fortinet Technologies Inc. FortiGate 6000F series hardware description The FortiGate 6000F series is a collection of 3U 19-inch rackmount appliances that include twenty-four 1/10/25GigE SFP28 and four 40/100GigE QSFP28 data network interfaces, as well as NP6 and CP9 processors to deliver high IPS/threat prevention performance. Currently, the following FortiGate 6000F series models are available: l FortiGate 6500F and FortiGate 6500F-DC l FortiGate 6501F and FortiGate 6501F-DC l FortiGate 6300F and FortiGate 6300F-DC l FortiGate 6301F and FortiGate 6301F-DC l FortiGate 6001F and FortiGate 6001F-DC All FortiGate 6000F series models have the same front and back panel configuration including the same network interfaces. The differences are the processing capacity of the individual models. All FortiGate 6000F series models include a management board (MBD) and internal Fortinet Processor Cards (FPCs) that contain NP6 and CP9 security processors. The management board handles management tasks, separating management tasks from data processing tasks that are handled by the FPCs. The FortiGate 6000F series uses session-aware load balancing to distribute sessions to the FPCs. The FortiGate 6500F includes ten FPCs and the FortiGate 6300F includes six FPCs. The FortiGate 6001F model includes a total of ten FPCs, by default three of them are active. To increase throughput you can purchase perpetual or subscription licenses for each of the additional seven FPCs for a total of ten. Also the FortiGate 6501F, 6301F, and 6001F models include two internal 1 TByte log disks in a RAID-1 configuration. FortiGate 6000F Series 7.0.12 System Guide 7
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
7
FortiGate 6000F series hardware description Fortinet Technologies Inc. FortiGate 6000F series front panel (FortiGate 6500F model shown) FortiGate 6001F model licensing The FortiGate 6001F model includes a total of ten FPCs, by default three of them are active. To increase throughput you can purchase subscription or perpetual licenses for each of the additional seven FPCs for a total of ten. l A subscription license provides access to one or more FPCs for the term of the subscription. Subscription licenses are managed by FortiGuard. l A perpetual license provides permanent access to one or more FPCs. Perpetual licenses are managed by applying a license key. Subscription and perpetual licenses can be purchased from Fortinet. The package you get when you purchase the license includes instructions for applying the license to your FortiGate from the Fortinet Support website. Applying your FortiGate 6001F FPC subscription license To apply your FortiGate 6001F FPC subscription license, you must register your FortiGate 6001F and purchase a FPC subscription license for it. From the Fortinet Support website you can apply the FPC perpetual license to the FortiGate 6001F. FortiGate 6000F Series 7.0.12 System Guide 8
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
8
FortiGate 6000F series hardware description Fortinet Technologies Inc. The subscription license will then be applied to the registered FortiGate 6001F through FortiGuard. It can take some time for the subscription license to be applied. From the FortiGate 6001F, you can enter the command execute update￾now to start a FortiGuard update instead of waiting for the next scheduled update. Activating your FortiGate 6001F FPC perpetual license To activate your FortiGate 6001F FPC perpetual license, you must register your FortiGate 6001F and purchase a FPC perpetual license for it. From the Fortinet Support website you can apply the FPC perpetual license to the FortiGate 6001F and obtain your FPC perpetual license activation code or license key. You can use the following command to apply your FPC perpetual license activation code or license key to activate FPCs for your FortiGate 6001F: execute upd-perpetual-license <license-key> After you enter this command, the FortiGate 6001F restarts and the licensed FPCs will be available. Verifying your FortiGate 6001F FPC subscription and perpetual licenses You can use the diagnose load-balance status command or the Cluster Status dashboard widget to view the number of FPCs that are available. These methods don't include any information about subscription or perpetual licenses, but they will show you how many FPCs are available, including the licensed FPCs. You can enter the get system status command to see the number of FPCs licensed by your perpetual license and by your subscription license. In the following example, the FortiGate 6001F has a perpetual license for two FPCs and a subscription license for three FPCs. get system status . . . FPC perpetual/subscription license: 2/3 You can also enter the following command to check the number of FPCs that you have subscription licenses for and the license expiration date. The following output shows a subscription license for three FPCs and that the license expires on June 26, 2025. diagnose load-balance fpc-license ========================================================================== MBD SN: <sn> subscription-license : 3 subscription-license: Thu Jun 26 2025 What to expect when your subscription license expires When the subscription license expires, the licensed FPCs are powered down and the output of the diagnose load￾balance fpc-license command changes to the following: diagnose load-balance fpc-license ========================================================================== MBD SN: <sn> FortiGate 6000F Series 7.0.12 System Guide 9
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
9
FortiGate 6000F series hardware description Fortinet Technologies Inc. subscription-license : 0 subscription-expiration: Expired There is a one hour grace period between the time the license expires and when the FPCs are shut down. If you run the diagnose load-balance fpc-license command during that hour grace period, the FPCs shut down immediately. Front panel interfaces All FortiGate 6000F models have the following front panel interfaces: l Twenty-four 1/10/25GigE SFP28 data network interfaces (1 to 24). The default speed of these interfaces is 10Gbps. These interfaces are divided into the following interface groups: 1 - 4, 5 - 8, 9 - 12, 13 - 16, 17 - 20, and 21 - 24. l Four 40/100GigE QSFP28 data network interfaces (25 to 28). The default speed of these interfaces is 40Gbps. l Two front panel 1/10GigE SFP+ HA interfaces (HA1 and HA2) used for heartbeat, session sync, and management communication between two and only two FortiGate 6000Fs in an HA cluster. The default speed of these interfaces is 10Gbps. Operating them at 1Gbps is not recommended. A FortiGate 6000F cluster consists of two (and only two) FortiGate 6000Fs of the same model. To set up HA, you can use a direct cable connection between the FortiGate 6000Fs HA1 interfaces and between their HA2 interfaces. l Two 10/100/1000BASE-T out of band management Ethernet interfaces (MGMT1 and MGMT2). l One front panel 1/10GigE SFP+ out of band management interface (MGMT3). l One RJ-45 RS-232 serial console connection. l One USB connector. Interface groups and changing data interface speeds Depending on the networks that you want to connect your FortiGate 6000F to, you may have to manually change the data interface speeds. The port1 to port24 data interfaces are divided into the following groups: l port1 - port4 l port5 - port8 l port9 - port12 l port13 - port16 l port17 - port20 l port21 - port24 All of the interfaces in a group operate at the same speed. Changing the speed of an interface changes the speeds of all of the interfaces in that group. For example, if you change the speed of port18 from 10Gbps to 25Gbps the speeds of port17 to port20 are also changed to 25Gbps. The port25 to port28 interfaces are not part of an interface group. You can set the speed of each of these interfaces independently of the other three. Another example, the default speed of the port1 to port24 interfaces is 10Gbps. If you want to install 25GigE transceivers in port1 to port24 to convert these data interfaces to connect to 25Gbps networks, you can enter the following from the CLI: config system interface edit port1 set speed 25000full next FortiGate 6000F Series 7.0.12 System Guide 10
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
10
FortiGate 6000F series hardware description Fortinet Technologies Inc. edit port5 set speed 25000full next edit port9 set speed 25000full next edit port13 set speed 25000full next edit port17 set speed 25000full next edit port21 set speed 25000full end Front panel LEDs LED State Description  STATUS Off The FortiGate 6000F is powered off. Green The FortiGate 6000F is powered on and operating normally. Flashing Green The FortiGate 6000F is starting up. ALARM Red Major alarm. One or more analog sensors have surpassed a critical or non￾recoverable (NR) threshold causing an alarm. When a critical threshold has been reached, it means that a condition has been detected that has surpassed an operating tolerance. For example, a temperature has increased above the allowed operating temperature range. Amber Minor alarm. One or more analog sensors (excluding PSUs) has surpassed a major or critical (CR) threshold. Any sensor, including sensors on PSUs, has generated an alert. Sensor alert criteria is defined per sensor. For analog sensors, alerts usually mean passing an upper critical (UC) or lower critical (LC) threshold. For other sensors, an alert could mean a flag bit is indicating an anomaly. Off No alarms HA Off The FortiGate 6000F is operating in normal mode. Green The FortiGate 6000F is operating in HA mode. Red The FortiGate 6000F is operating in HA mode and the HA heartbeat cannot find the other FortiGate 6000F in the HA cluster. PWR Off The FortiGate 6000F is powered off. Green The FortiGate 6000F is powered on and operating normally. FortiGate 6000F Series 7.0.12 System Guide 11
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
11
FortiGate 6000F series hardware description Fortinet Technologies Inc. LED State Description 1 to 24 Link/Activity Green This interface is connected at 25Gbps /10Gbps /1Gbps with the correct cable and the attached network device has power. Flashing Green Network traffic on this interface. Off No link is established. 25 to 28 Link/Activity Green This interface is connected at 100Gbps /40Gbps with the correct cable and the attached network device has power. Flashing Green Network traffic on this interface. Off No Link MGMT1 MGMT2 Link/ Activity (Left LED) Green This interface is connected at 1Gbps or 100Mbps with the correct cable and the attached network device has power. Flashing Green Network traffic on this interface. Off No link is established. MGMT1 MGMT2 Speed (Right LED) Green This interface is connected at 1Gbps. Amber This interface is connected at 100Mbps Off No link is established. MGMT3 Link/ Activity (Left LED) Green This interface is connected at 10Gbps or 1Gbps with the correct cable and the attached network device has power. Flashing Green Network activity at the interface. Off No link is established. MGMT3 (Right LED) Not used. HA1 HA2 Link/Activity Green This interface is connected at 10Gbps or 1Gbps with the correct cable and the attached network device has power Flashing Green Network activity at the interface. Off No link is established. Front panel connectors You connect the FortiGate 6000F to your 25 Gbps or 10 Gbps networks using the 1 to 24 SFP28 front panel interfaces. You can also connect the FortiGate 6000F to your 100 Gbps or 40 Gbps networks using the 25 to 28 front panel QSFP28 interfaces. The front panel also includes 10 GigE SPF+ HA heartbeat interfaces (HA1 and HA2), two Ethernet FortiGate 6000F Series 7.0.12 System Guide 12
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
12
FortiGate 6000F series hardware description Fortinet Technologies Inc. 10/100/1000 copper management interfaces (MGMT1 and MGMT2), a 10 GigE SPF+ management interface (MGMT3), an RJ-45 RS-232 serial console port, and a USB port. The USB port can be used with any USB key for backing up and restoring configuration files. Connector Type Speed Protocol Description 1 to 24 SFP28 1/10/25Gbps Ethernet 1/10/25GigE connection using SFP28 or SPF+ transceivers. For traffic interfaces. 25 to 28 QSFP28 40/100Gbps Ethernet 40/100GigE connections using QSFP28 or QSFP+ transceivers. For traffic interfaces. MGMT1 MGMT2 RJ-45 10/100/1000Mbps Ethernet 10/100/1000BASE-T copper connections for out of band management or system administration. MGMT3 SFP+ 1/10Gbps Ethernet 1/10GigE connection using an SFP+ or SFP transceiver. For out of band management or system administration. HA1 HA2 SFP+ 1/10Gbps Ethernet 1/10GigE connection using SFP+ or SFP transceivers. For HA heartbeat and synchronization. 1GigE not recommended. CONSOLE RJ-45 9600bps data bits: 8 parity: none stop bits: 1 flow control: none RS-232 Serial interface for console access. USB USB 3.0 Type A USB 3.0 USB 2.0 Standard USB connector. Console port Using standard terminal emulator software (such as PuTTY) and a RS-232 serial convertor, you can connect to the FortiGate 6000F console port using the following serial settings: You can use the USB to RJ-45 RS-232 cable included with your FortiGate 6000F Console port to connect to the FortiGate 6000F CLI with these settings: Baud Rate (bps) 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None FortiGate 6000F Series 7.0.12 System Guide 13
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
13
FortiGate 6000F series hardware description Fortinet Technologies Inc. From the Console port, you can connect to the management board (MBD) CLI of the FortiGate 6000F. You can also press Ctrl+T to switch between the management board CLI and the CLIs of each of the FPCs in your FortiGate 6000F (the new destination is displayed in the terminal window). The FortiGate 6500F has a management board and 10 FPCs; 11 consoles in total. The FortiGate 6300F has a management board and 6 FPCs; 7 consoles in total. To use the CTRL+T shortcut keys to switch to the CLI of each FPC: l Press CTRL+T once to see the current active slot (MBD or FPC#). l Quickly double press CTRL+T to switch to the next slot. For example, of you are connected to the management board, quickly press CTRL+T twice to switch to FPC1. If this is the first time you are using the console connection, you might want to practice switching slots to get the timing right. You should only make configuration changes on the management board CLI. You can cycle through individual FPC consoles to use diagnose, get, or execute commands to log into individual FPCs. Once the console port is connected to the CLI that you want to use, press Enter to enable the CLI and log in. When your session is complete you can press Ctrl+T to connect to another CLI. Your FortiGate 6000F package includes a USB to RJ-45 serial cable that you can use to connect a management PC USB port to the FortiGate 6000F console port. Fortinet USB to RJ-45 serial cable RJ-45 pinout RJ-45 Color Function 5 Green Ground 3 Black Rx 6 Yellow Tx Connecting to the CLI of an individual FPC Use the following steps to connect to the CLI of the FPC in slot 4: (FPC04) 1. Connect the console cable supplied with your FortiGate 6000F to the console port and to your PC USB port. 2. Start a terminal emulation program on the PC. Use these settings: Baud Rate (bps) 9600, Data bits 8, Parity None, Stop bits 1, and Flow Control None. 3. Press Ctrl+T to enter console switch mode. 4. Repeat pressing Ctrl+T until you have connected to FPC04. Example prompt: <Switching to Console: FPC04 (9600)> FortiGate 6000F Series 7.0.12 System Guide 14
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
14
FortiGate 6000F series hardware description Fortinet Technologies Inc. 5. Login with an administrator name and password. 6. When your session is complete, enter the exit command to log out. NMI switch and NMI reset commands When working with Fortinet Support to troubleshoot problems with your FortiGate 6000F you can use the front panel non-maskable interrupt (NMI) switch to assist with troubleshooting. Pressing this switch causes the software to dump management board registers/backtraces to the console. After the data is dumped the management board reboots. While the management board is rebooting, traffic is temporarily blocked. The management board should restart normally and traffic can resume once the management board is up and running. You can use the following command to dump registers/backtraces of one or more FPCs to the console. After the data is dumped, the FPCs reboot. While the FPCs are rebooting, traffic is distributed to the remaining FPCs. The FPCs should restart normally and traffic can resume once they are up and running. execute load-balance slot nmi-reset <slot-number(s)> Where <slot-number(s)> can be one or more FPC slot numbers or slot number ranges with no space and separated by commas. For example: execute load-balance slot nmi-reset 1,3-4 FortiGate 6000F series back panel The FortiGate 6000F series back panel includes three hot swappable cooling fan trays and three hot swappable redundant AC power supply units (PSUs). For more information on power connections and redundant power, see FortiGate 6000F AC power supply units (PSUs) on page 20. The FortiGate 6000F DC models include two hot swappable -48 to -60 VDC, 50A max DC PSUs. For DC power information, see DC PSUs and supplying DC power to a FortiGate 6000F on page 24. The back panel also includes the FortiGate 6000F ground connector that must be connected to ground. FortiGate 6000F Series 7.0.12 System Guide 15
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
15
FortiGate 6000F series hardware description Fortinet Technologies Inc. FortiGate 6000F back panel (FortiGate 6501F AC model shown) FortiGate 6000F series schematic FortiGate 6000F hardware includes a data plane and a management plane. The data plane processes customer network data. The management plane handles management functions such as administrator logins, configuration and session synchronization, SNMP, and other monitoring, HA heartbeat communication, and remote and (if supported) local disk logging. Separating these two planes means that resources used for data processing are not compromised by management activities. In the data plane, two DP3 load balancers use session-aware load balancing to distribute sessions from the front panel interfaces (port1 to 28) to Fortinet Processor Cards (FPCs). The DP3 processors communicate with the FPCs across the 3.2Tbps integrated switch fabric. Each FPC processes sessions load balanced to it. The FPCs send outgoing sessions back to the integrated switch fabric and then out the network interfaces to their destinations. The NP6 processor in each FPC enhances network performance with fastpath acceleration that offloads communication sessions from the FPC CPU. The NP6 processor can also handle some CPU intensive tasks, like IPsec VPN encryption/decryption. The CP9 processors in each FPC accelerate many common resource intensive security related processes such as SSL VPN, Antivirus, Application Control, and IPS. The management plane includes the management board, base backplane, management interfaces, and HA heartbeat interfaces. Configuration and session synchronization between FPCs in a FortiGate 6000F occurs over the base backplane. In an HA configuration, configuration and session synchronization between the FortiGate 6000Fs in the cluster takes place over the HA1 and HA2 interfaces. Administrator logins, SNMP monitoring, remote logging to one or more FortiAnalyzers or syslog servers, and other management functions use the MGMT1, MGMT2, and MGMT3 interfaces. You can use the 10Gbps MGMT3 interface for additional bandwidth that might be useful for high bandwidth activities such as remote logging. FortiGate 6000F Series 7.0.12 System Guide 16
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
16
FortiGate 6000F series hardware description Fortinet Technologies Inc. FortiGate 6000F series hardware information This section introduces FortiGate 6000F series hardware components and accessories. Shipping components The FortiGate 6000F ships pre-assembled with the following components: l The 3U FortiGate 6000F. l The AC version of the FortiGate 6000F includes three AC Power Supply Units (PSUs) installed in the back panel. FortiGate 6000F Series 7.0.12 System Guide 17
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
17
FortiGate 6000F series hardware description Fortinet Technologies Inc. l The DC version of the FortiGate 6000F includes two DC PSUs installed in the back panel. l The AC version of the FortiGate 6000F includes three power cords with C15 power connectors. l The DC version of the FortiGate 6000F includes two custom DC power cables that include a two prong connector with a release tab on one end and double hole lug plates on the other end. l Three cooling fan trays installed in the back panel. l One set of two sliding rails for 4-post rack mounting. l Six rubber feet. l One USB to RJ-45 RS-232 console cable. l One RJ-45 Ethernet cable. l Two FG-TRAN-SFP+SR transceivers. Optional accessories and replacement parts The following optional accessories can be ordered separately: SKU Description FG-6000F-FAN FortiGate 6000F fan tray. SP-FG4000F-PS 2000W AC PSU when connected to high line AC power (200VAC or higher). 1500W AC if connected to low-line AC (120VAC or below). SP-FG4000F-DC-PS 2000W DC PSU. FG-7040E-PS-AC 1500W AC PSU. (FortiGate 6000F Generation 1) You can also order the following: l Transceivers Physical description of the FortiGate 6000F The FortiGate 6000F is a 3U appliance that can be installed in a standard 19-inch rack. The following table describes the physical characteristics of the FortiGate 6000F chassis. Form factor 3RU Dimensions (H x W x D) 5.20 x 17.20 x 26.18 in (132 x 437 x 665 mm) Rack mount type Sliding rail FortiGate 6300F and 6301F weight 67.68 lbs 30.7 kg FortiGate 6500F and 6501F weight 78.26 lbs 35.5 kg FortiGate 6001F weight 78.26 lbs 35.5 kg Operating temperature 32 to 104°F (0 to 40°C) Storage temperature -31 to 158°F (-35 to 70°C) Relative humidity 20% to 90% non-condensing FortiGate 6000F Series 7.0.12 System Guide 18
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
18
FortiGate 6000F series hardware description Fortinet Technologies Inc. Average noise level 57.43 dbA Input voltage range 100 to 240 VAC (50 to 60 Hz) Supplied power supply units (PSUs) 3xSP-FG4000F-PS (2+1 redundancy) or 2xSP-FG4000F-DC-PS (1+1 redundancy) Max power consumption 1568W Average power consumption 1328W Max current (AC) 30A@100VAC, 20A@240VAC Heat dissipation 5350 BTU/hr Joules/hr 5645 KJ/hr FortiGate 6000F series hardware generations Two generations of FortiGate 6000F series hardware are now available. Both generations support the same software features. Generation 2 has two hardware improvements: l The FPCs include more memory. l When connected to high-line AC power, generation 2 FortiGate 6000F series models provide 1+1 PSU redundancy. When connected to high-line AC power, each PSU provides 2000W, which is enough power to run the entire system including all FPCs. For more information on FortiGate 6000F series generation 1 and generation 2, including supported firmware versions and how to determine the generation of your FortiGate 6000F series hardware, see the Fortinet Community article: Technical Tip: Information on FortiGate 6000F series Gen1 and Gen2. For more information on generation 1 and generation 2 AC PSUs, see FortiGate 6000F AC power supply units (PSUs) on page 20. The FortiGate 6001F is a generation 2 appliance. Cooling fan trays The FortiGate 6000F contains three hot swappable cooling fan trays installed in the back of the appliance. When the fan LED is green the fan tray is operating normally. If a fan tray LED turns red or goes off the fan tray should be replaced. FortiGate 6000F Series 7.0.12 System Guide 19
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
19
FortiGate 6000F series hardware description Fortinet Technologies Inc. Cooling Fan Tray Fan trays are hot swappable. You can replace a failed fan tray while the FortiGate 6000F is operating. To replace a fan tray, unscrew the four retention screws and use the handle to pull the fan tray out of the chassis. Install the new fan tray by sliding it into place. As you slide the new fan into place it will power up. Tighten the retention screws. The other fan trays will continue to operate and cool the chassis as a fan tray is being removed and replaced. However an open fan tray slot will result in less air flow through the appliance so do not delay installing the replacement fan tray. The FortiGate 6000F monitors the internal temperature of the appliance and adjusts the operating speed of the cooling fans as required. When the device is first powered on all cooling fans run at full speed. Once the system is up and running, the fan speeds are reduced to maintain an optimum temperature in the appliance. During normal operation, all fan trays are active. If cooling requirements increase, the fan speed will increase. FortiGate 6000F AC power supply units (PSUs) The FortiGate 6000F back panel includes three hot swappable redundant AC PSUs (PSU1, PSU2, and PSU3). Two generations of FortiGate 6000F models have been released. Generation 1 and generation 2 have different AC PSUs: l Generation 2 FortiGate 6000F PSUs can be connected to high-line AC power (200VAC or higher) and each PSU provides 2000W AC. A generation 2 FortiGate 6000F with two high line power feeds connected to PSU1 and PSU2 is a fully 1+1 redundant solution because a single PSU can fully power a FortiGate 6000F. l Generation 1 FortiGate 6000F PSUs can be connected to low line AC power (120VAC or below) and each PSU provides 1500W AC. Requires at least 2 PSUs to be connected to power. Connecting a third PSU provides 2+1 redundancy. If only one PSU is operating, some FPCs will be shut down and performance will be reduced. l You can also connect generation 2 FortiGate 6000F PSUs to low-line AC power (120VAC or below) and each PSU provides 1500W AC. Requires at least 2 PSUs to be connected to power. Connecting a third PSU provides 2+1 redundancy. If only one PSU is operating, some FPCs will be shut down and performance will be reduced. Use a supplied C15 power cable to connect power to each PSU C16 power connector. C15/C16 power connectors are used for high temperature environments and are rated up to 120°C. FortiGate 6000F Series 7.0.12 System Guide 20
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
20
FortiGate 6000F series hardware description Fortinet Technologies Inc. For more information on FortiGate 6000F generation 1 and generation 2, including supported firmware versions and how to determine the generation of your FortiGate 6000F hardware, see the Fortinet Knowledge base article: Technical Tip: Information on FortiGate 6000F series Gen1 and Gen2. Generation 1 AC PSU showing C16 power connector Generation 2 AC PSU showing C16 power connector Individual AC PSUs do not have to be connected to ground. Instead you can use the information in Connecting the FortiGate 6000F to ground on page 27 to connect the FortiGate 6000F to ground. Connecting generation 2 FortiGate 6000F PSUs to high line AC power If you connect a generation 2 FortiGate 6000F to high-line AC power, each PSU provides 2000W AC, which is all the power required by the FortiGate 6000F. Only two PSUs (PSU1 and PSU2) each connected to separate power feeds, are FortiGate 6000F Series 7.0.12 System Guide 21
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
21
FortiGate 6000F series hardware description Fortinet Technologies Inc. required for full 1+1 power redundancy. PSU3 may also be connected if you have three separate power feeds and provides 1+1+1 redundancy. To maintain redundancy, you should replace any failed PSUs. See FortiGate 6000F series back panel on page 15 for locations of the PSUs. Recommended fully redundant configuration when connected to high-line AC power: l Two FortiGate 6000Fs in a High Availability (HA) configuration connected to two power feeds. l On both FortiGate 6000Fs, connect PSU1 and PSU2 to different power feeds. Connecting generation 1 or 2 FortiGate 6000F PSUs to low line AC power If you connect a generation 1 FortiGate 6000F or a generation 2 FortiGate 6000F PSU to low line AC power, each PSU provides 1500W AC and at least two PSUs (PSU1 and PSU2) must be connected to power. PSU3 is a backup PSU and provides 2+1 redundancy. All PSUs should be connected to AC power. See FortiGate 6000F series back panel on page 15 for locations of the PSUs. Recommended FortiGate 6000F low line AC power fully redundant configuration: l Two FortiGate 6000Fs (Unit 1 and Unit 2) in a High Availability (HA) configuration with two power feeds (Feed A and Feed B). l Connect PSU1 and PSU2 of Unit 1 to Feed A. Connect PSU3 of Unit 1 to Feed B. l Connect PSU1 and PSU2 of Unit 2 to Feed B. Connect PSU3 of Unit 2 to Feed A. For normal operation of a FortiGate 6000F connected to low line AC power, at least 2 PSUs must be operating and connected to power. If two PSUs fail and only one PSU is operating, the FortiGate 6000F will continue to operate but only four FPCs will be running, the remaining FPCs are shut down. This means the performance of the FortiGate 6000F is reduced until at least two PSUs are connected. If only one PSU is operating, the FortiGate 6000F shuts down the FPCs starting with the FPC with the highest slot number, until only four FPCs are running. Usually this results in the FPCs in slots 1 to 4 running if there is only one PSU connected. If one of the FPCs in slot 1 to 4 has previously shut down, the FortiGate 6000F keeps the four operational FPCs in the lowest slot numbers running. For example, if the FPC in slot 2 has previously shut down, if only one PSU is operating, the FPCs in slots 1, 3, 4, and 5 continue running. The FortiGate 6000F also keeps the primary FPC running. Usually the FPC in slot 1 is the primary FPC, so if only one PSU is operating, the FPCs in slots 1 to 4 continue running. However, if the FPC in another slot has become the primary FPC, then this FPC as well as the three remaining FPCs with the lowest slot numbers will continue running. For example, if the FPC in slot 6 has become the primary FPC, then when only one PSU is operating, the FPCs in slots 1, 2, 3, and 6 continue running. AC PSU LED states The PSU LED indicates whether the PSU is operating correctly and connected to power. FortiGate 6000F Series 7.0.12 System Guide 22
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
22
FortiGate 6000F series hardware description Fortinet Technologies Inc. State Description Off AC power not connected. If this LED is not lit, check to make sure the PSU is connected to a power feed. If the power feed is good then the PSU has failed and should be replaced. Flashing green The PSU is in standby mode, not supplying power to the chassis. Green Normal Operation with AC power connected. Amber Fault condition (PSU shuts down). This can occur if power input or output is out of the normal operating range, temperature is out of the normal range, or one or more fans are not operating. This may be caused by a problem with the PSU. This could also be caused by conditions external to the PSU, for example, if there is a problem with the power supplied to the PSU or if the PSU has gotten too hot because of insufficient ventilation. Flashing amber Warning that power input or output, temperature, or fan operation is close to being outside of the normal operating range. This may be caused by a problem with the PSU. This could also be caused by conditions external to the PSU, for example, if there is a problem with the power supplied to the PSU or if the PSU has gotten too hot because of insufficient ventilation. Connecting FortiGate 6000F PSUs to AC power Use the following steps to connect a FortiGate 6000F PSU to AC power after connecting the chassis to ground. 1. Use the supplied C15 Power cables to connect each PSU C16 power connector to a separate surge protected power supply. You can install power cord clamps into the back of the chassis beside each PSU. Install the clamps by inserting them into the holes adjacent each supply at the back of the chassis. Use the clamps to secure the AC power cords so they are not accidentally disconnected. 2. As the FortiGate 6000F powers up, the status LED flashes green. Once the FortiGate 6000F has started up and is operating correctly, the front and back panel LEDs should indicate normal operation (see Confirming startup status on page 38). Individual AC PSUs do not have to be connected to ground. Instead you can use the information in Connecting the FortiGate 6000F to ground on page 27 to connect the FortiGate 6000F to ground. Hot swapping an AC PSU Follow these steps to safely hot swap an AC PSU. You can hot swap a PSU without affecting performance or interrupting traffic as long as one PSU remains connected to power at all times. FortiGate 6000F Series 7.0.12 System Guide 23
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
23
FortiGate 6000F series hardware description Fortinet Technologies Inc. 1. Attach an ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the chassis or frame. 2. Turn off the power being supplied to the PSU and disconnect the power cord. 3. Press the latch towards the handle until the PSU is detached then pull it out of the FortiGate 6000F. 4. Insert a replacement PSU into the FortiGate 6000F and slide it in until it locks into place. 5. Use a supplied C15 power cable to connect power to the PSU C16 power connector. 6. Turn on power to the PSU. 7. Verify that the PSU status LED is solid green meaning that the PSU is powered up and operating normally. DC PSUs and supplying DC power to a FortiGate 6000F The DC version of the FortiGate 6000F includes two hot swappable -48 to -60 VDC, 50A max DC PSUs. Each PSU has an internal 60A/170VDC fast blow fuse on the DC line input. Only one PSU must be connected to power. The second PSU is a backup PSU that provides 1+1 redundancy. See FortiGate 6000F series back panel on page 15 for locations of the PSUs. The diagram shows three AC PSUs, the DC version replaces the AC PSUs with two DC PSUs in slots PSU1 and PSU2. PSU3 is covered by a metal panel. Recommended fully redundant configuration: l Two FortiGate 6000Fs in a High Availability (HA) configuration with two power feeds (A and B). FortiGate 6000F supports HA with two and only two FortiGate 6000Fs. l On both FortiGate 6000Fs, connect each PSU to a different power feed. For normal operation of a single FortiGate 6000F, only one DC PSU must be operating and connected to power. If only one DC PSU is operating, all components and all FPCs continue to operate normally. However, to maintain redundancy, you should replace a failed DC PSU. Each DC PSU is designed to be installed in a Telecom data center or similar location that has available -48VDC power fed from a listed 50A circuit breaker. To improve redundancy you can connect each PSU to a separate power circuit. DC PSU Individual DC PSUs do not have to be connected to ground. Instead you can use the information in Connecting the FortiGate 6000F to ground on page 27 to connect the FortiGate 6000F to ground. FortiGate 6000F Series 7.0.12 System Guide 24
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
24
FortiGate 6000F series hardware description Fortinet Technologies Inc. Fortinet supplies custom DC power cables that connect to the two-prong power connector on each DC PSU. The connector clicks into a release tab that secures the cable into place. DC terminal rings on the supplied cable must be securely and safely fastened to the your data center power supply terminals. The supplied DC power cables are intended to be used only for in-rack wiring, must be routed away from sharp edges, and must be adequately fixed to prevent excessive strain on the wires and terminals. DC PSU Power ratings Max Inrush Current 50A Max Inrush Current Duration 200ms Normal Input Voltage -48VDC to -60VDC Maximum Input Voltage -40.8VDC to -72VDC Input Current Average: 12.5A@48V for each PSU, Max: 50A DC PSU LED States State Description Off DC power not connected. Flashing green The PSU is in standby mode, not supplying power to the chassis. Green Normal operation with DC power connected. Amber Fault condition (PSU shuts down). This can occur if power input or output is out of the normal operating range, temperature is out of the normal range, or one or more fans are not operating. This may be caused by a problem with the PSU. This could also be caused by conditions external to the PSU, for example, if there is a problem with the power supplied to the PSU or if the PSU has gotten too hot because of insufficient ventilation. Flashing amber Warning that power input or output, temperature, or fan operation is close to being outside of the normal operating range. This may be caused by a problem with the PSU. This could also be caused by conditions external to the PSU, for example, if there is a problem with the power supplied to the PSU or if the PSU has gotten too hot because of insufficient ventilation. Crimping guidelines The DC power cord is a two prong connector with a release tab on one end and double hole lug plates on the other end. The DC power source must have a 1/4" (0.64cm) stud to secure the lugs . The distance between the studs should be 5/8" (1.59cm). The DC power source terminals should allow at least support 50A. If the DC power source does not meet these requirements the cord must be cut and re-crimped to match the DC terminals. Do not crimp energized wires. FortiGate 6000F Series 7.0.12 System Guide 25
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
25
FortiGate 6000F series hardware description Fortinet Technologies Inc. Follow these crimping guidelines: l Strip the insulation from cable. Be careful not to nick cable strands which may later result in stands breaking. l Cable end should be clean: wire brush or clean with emery cloth if necessary. Insert cable into connector until it stops. The insertion length must approximate the stripped length of cable. l Insert connector in die and compress between the markings beginning near the tongue of the connector. Using the wrong installing die may result in a defective connection. l After crimping, remove all sharp edges, flash, or burrs. Connecting a FortiGate 6000F DC PSU to DC power The following procedure describes how to connect a FortiGate 6000F DC PSU to DC power. Repeat this procedure to connect each PSU. You need the following equipment to connect the FortiGate 6000F DC PSUs to DC power: l An electrostatic discharge (ESD) preventive wrist strap with connection cord. l One of the supplied DC power cables, that include a two prong connector with a release tab on one end and black and red double hole lug plates on the other end. Black for -48V and red for RTN. Individual DC PSUs do not have to be connected to ground. Instead you can use the information in Connecting the FortiGate 6000F to ground on page 27 to connect the FortiGate 6000F to ground. To connect a DC PSU to DC power 1. Attach the ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the chassis or frame. 2. Make sure that the PSU and power cords are not energized. 3. Connect the black -48V power wire to your -48V DC power source using the ring terminal. 4. Connect the red RTN power wire from to your RTN connector using the ring terminal. 5. Plug the power cable into the FortiGate 6000F PSU connector. Slide the connector in until the release tab clicks, locking the cable in place. 6. Make sure the power wires are secured using tie wraps if required. 7. If required, label the black wire -48V. 8. If required, label the red wire RTN. 9. Turn on power to the PSU. 10. Verify that the PSU status LED is solid green meaning that the PSU is powered up and operating normally. FortiGate 6000F Series 7.0.12 System Guide 26
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
26
FortiGate 6000F series hardware description Fortinet Technologies Inc. Hot Swapping a DC PSU Follow these steps to safely hot swap a DC PSU. You can hot swap a PSU without powering down the FortiGate 6000F as long as one PSU continues to be connected to power and operating normally. 1. Attach an ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the chassis or frame. 2. Turn off the power being supplied to the DC PSU to be hot swapped. 3. Disconnect the power cable from the FortiGate 6000F DC PSU by pressing the release tab and unplugging the cable. 4. To remove the PSU, press the latch towards the handle until the PSU is detached then pull it out of the chassis. 5. Insert a replacement PSU into the chassis and slide it in until it locks into place. 6. Plug power cord into the FortiGate 6000F PSU connector. Slide the connector in until the release tab clicks, locking the cable in place. 7. Turn on power to the PSU. 8. Verify that the PSU status LED is solid green meaning that the PSU is powered up and operating normally. Connecting the FortiGate 6000F to ground The FortiGate 6000F appliance includes a ground terminal on the FortiGate 6000F back panel. The ground terminal provides two connectors to be used with a double-holed lug such as Thomas & Betts PN 54850BE. This connector must be connected to a local ground connection. You need the following equipment to connect the FortiGate 6000F to ground: l An electrostatic discharge (ESD) preventive wrist strap with connection cord. l One green 6 AWG stranded wire with listed closed loop double-hole lug suitable for minimum 6 AWG copper wire, such as Thomas & Betts PN 54850BE. To connect the FortiGate 6000F chassis to ground 1. Attach the ESD wrist strap to your wrist and to an ESD socket or to a bare metal surface on the FortiGate 6000F. 2. Make sure that the FortiGate 6000F and ground wire are not energized. 3. Connect the green ground wire from the local ground to the ground connector on the FortiGate 6000F. FortiGate 6000F Series 7.0.12 System Guide 27
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
27
FortiGate 6000F series hardware description Fortinet Technologies Inc. 4. Secure the ground wire to the FortiGate 6000F. 5. Optionally label the wire GND. FortiGate 6000F Series 7.0.12 System Guide 28
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
28
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. FortiGate 6000F hardware assembly and rack mounting The FortiGate 6000F appliance can be mounted in a standard 19-inch rack and requires 3U of vertical space in the rack. The FortiGate 6000F can also be surface mounted. Cautions and warnings FortiGate 6000Fs must be protected from static discharge and physical shock. Only handle or work with FortiGate 6000Fs at a static-free workstation. Always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate 6000Fs. If you install the FortiGate 6000F appliance in a closed or multi-unit rack assembly, the operating ambient temperature of the rack environment may be greater than room ambient temperature. Make sure the operating ambient temperature does not exceed the manufacturer's maximum rated ambient temperature. To avoid personal injury or damage to the FortiGate 6000F appliance, it is recommended that two or more people install the FortiGate 6000F into the rack. Do not place heavy objects on the appliance. Ensure there is enough room around the appliance to allow for sufficient air flow. Cooling air flow and required minimum air flow clearance When installing the FortiGate 6000F, make sure there is enough clearance for effective cooling air flow. The following diagram shows the cooling air flow through the FortiGate 6000F and the location of fan trays. Make sure the cooling air intake and warm air exhaust openings are not blocked by cables or rack construction because this could result in cooling performance reduction and possible overheating and component damage. FortiGate 6000F cooling air flow and minimum air flow clearance (appliance side view) All cool air enters the appliance through the front panel and all warm air exhausts out the back. For optimal cooling allow 100 mm of clearance at the front and back of the chassis. This results in a total footprint of 850 mm from front to back. Side clearance is not required. FortiGate 6000F Series 7.0.12 System Guide 29
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
29
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. FortiGate 6000F four post rack-mount installation This section describes how to use the sliding rails included with your FortiGate 6000F package to install the FortiGate 6000F in a 4-post rack. The FortiGate 6000F is shipped with a left and a right rail assembly. Each rail assembly includes an inner rail, a middle rail, and an outer rail. The inner rail attaches to the side of the FortiGate 6000F. The middle rail remains attached to the outer rail which attaches to the rack. The middle rail is used to guide the inner rail into the outer rail. Sliding rails When mounted on the rails and fully slid into the rack, the FortiGate 6000F locks into place. You can press the system release buttons that project out of the front of the rack to unlock the rails and slide the FortiGate 6000F out. No tools are required to install the rails and the FortiGate 6000F. Once the FortiGate 6000F is slid into the rack you can use a screw driver to install four rack screws to secure the FortiGate 6000F in the rack. Installation steps There are three steps to use the sliding rails to install the FortiGate 6000F in a four-post the rack: 1. Attach the right and left inner rails to the right and left sides of the FortiGate 6000F. 2. Attach the right and left outer rails to the right and left rack posts. 3. Slide the FortiGate 6000F into the rack. As a supplement to the instructions below, you can view the following video: https://video.fortinet.com/latest/rack-mount-sliding-rail-installation FortiGate 6000F Series 7.0.12 System Guide 30
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
30
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. Tabs, holes, and clips on the right inner rail Attaching the inner rails to the FortiGate 6000F Use the following steps to install the right inner rail and then repeat them for the left inner rail. 1. Remove the FortiGate 6000F from its packaging and place it on a flat surface. For example, on a lifting device in front of the rack that it will be installed into. 2. Remove the right rail assembly from the packaging, and begin sliding the right inner rail out of it. 3. Unlock the right inner rail release tab to release the inner rail and slide it completely out of its rail assembly. 4. Locate the four rail hooks on the right side of the FortiGate 6000F and the corresponding holes on the inner rail. 5. Align the holes with the hooks and press the hooks into the holes to attach the right inner rail to the right side of the FortiGate 6000F. FortiGate 6000F Series 7.0.12 System Guide 31
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
31
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. 6. Slide the inner rail towards the front of the FortiGate 6000F until the inner rail metal clip clicks, locking the rail onto the side of the FortiGate 6000F. 7. Repeat these steps to attach the left inner rail to the left side of the FortiGate 6000F. Attaching the outer rails to the rack The ends of outer rails wrap around the inside edge of the rack posts and the mounting pins click into place. 1. Align the front of right outer rail with the right front post of the rack. 2. Push the front mounting pins into the rack post holes. 3. Pull the securing plate over the rack post and close it to lock the pins in place. 4. Pull out the bracket on the back of the right outer rail to adjust its position until it matches up with the back post of the rack. 5. Verify that the rail is level, then push the rear mounting pins into the rack post holes. 6. Repeat these steps for the left outer rail. Make sure it is installed at the same height as the right outer rail. Sliding the FortiGate 6000F into the rack Now that the inner and outer rails are attached, you can slide the FortiGate 6000F into the rack by matching the inner rails with the outer rails. 1. Verify that the inner rail holes are properly connected to the FortiGate 6000F hooks and locked into place. 2. Verify that the outer rails are level, both at the same height, and securely attached to the rack. 3. Pull the middle rails out from the front of the outer rails until they lock into place. FortiGate 6000F Series 7.0.12 System Guide 32
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
32
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. 4. Use a lifting device to raise the FortiGate 6000F to allow you to align the inner rails with the middle rails. 5. Slide the inner rails into the middle rails until the lock out tabs on the inner rails click into the front of the middle rails. Keep the rails aligned and apply even pressure to both sides of the FortiGate 6000F while doing this. 6. Slide the release tabs forward on both inner rails at the same time. 7. Push the FortiGate 6000F all the way into the rack until the system release buttons click into the locked position on the front of the rack. 8. Use a screw driver to install four rack screws into the handle brackets on the front of the FortiGate 6000F to secure it in the rack. FortiGate 6000F Series 7.0.12 System Guide 33
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
33
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. Removing the FortiGate 6000F from a four-post rack Make sure that a lifting device is available to slide the FortiGate 6000F on to when removing it from the rack. You will need a screwdriver to remove the four rack screws. The rack must be stable before sliding the FortiGate 6000F out. Failure to stabilize the rack may cause it to tip over. Do not pick up the FortiGate 6000F by the front handles. They are designed to pull the FortiGate 6000F from the rack on the rails. 1. Power down the FortiGate 6000F and remove all cables connected to it. 2. Remove the four rack screws to allow the FortiGate 6000F to slide out of the rack. 3. Squeeze the system release buttons on the front of both inner rails at the same time to release the FortiGate 6000F. 4. Use the front handles to pull the FortiGate 6000F out of the rack until the rails lock in their fully extended position. 5. Raise the lifting device under the FortiGate 6000F. 6. Slide the system lock out tabs forward on both inner rails, and slowly slide the FortiGate 6000F away from the rack and onto the lifting device. Apply even pressure to both sides of the FortiGate 6000F while doing this. As you slide the FortiGate 6000F out, the inner rails will slide out of the middle rails. FortiGate 6000F Series 7.0.12 System Guide 34
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
34
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. 7. Push the middle rail latch counter clockwise, and slide the middle rails back into the outer rails. 8. Push the metal clip on each inner rail toward the front of the FortiGate 6000F to release the inner rails from the hooks on the side of the FortiGate 6000F and remove the inner rails. Surface-mount installation 1. Make sure that the surface onto which the FortiGate 6000F is to be installed is clean, level, and stable and that there is at least 100 mm of front and back clearance to allow for adequate cooling air flow. 2. Attach the six provided rubber feet to the bottom of the FortiGate 6000F. 3. Place the FortiGate 6000F in the designated location. 4. Verify that the spacing around the FortiGate 6000F conforms to requirements and that the FortiGate 6000F is level. Installing QSFP28, SFP28, SFP+, and SFP transceivers You must install QSFP28 or QSFP+ transceivers into the 25 to 28 interfaces before connecting them to 100Gbps or 40Gbps networks. You must install SFP28, SFP+, or SPF transceivers into the 1 to 24 interfaces before connecting them to 25Gbps, 10Gbps. or Gigabit networks. You may need to manually change interface speeds as described in Interface groups and changing data interface speeds on page 10. You must install the following types of SFP+ or SFP transceivers into the MGMT3, HA1, and HA2 interfaces before connecting them to 10Gbps or Gigabit networks. l 10GBASE-SR SFP+ (10Gbps) l 10GBASE-LR SFP+ (10Gbps) l 1000BASE SFP (1Gbps) The HA1 and HA2 interfaces are used for heartbeat, session sync, and management communication between two and only two FortiGate 6000Fs in HA mode. This communication requires SFP+ 10 Gbps connections. Using to SFP 1 Gbps connections is not recommended. FortiGate 6000F Series 7.0.12 System Guide 35
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
35
FortiGate 6000F hardware assembly and rack mounting Fortinet Technologies Inc. To install transceivers To complete this procedure, you need: l A FortiGate 6000F l Transceivers to install l An electrostatic discharge (ESD) preventive wrist strap with connection cord FortiGate 6000Fs must be protected from static discharge and physical shock. Only handle or work with FortiGate 6000Fs at a static-free workstation. Always wear a grounded electrostatic discharge (ESD) preventive wrist strap when handling FortiGate 6000Fs. Handling the transceivers by holding the release latch can damage the connector. Do not force transceivers into their cage slots. If the transceiver does not easily slide in and click into place, it may not be aligned correctly. If this happens, remove the transceiver, realign it and slide it in again. 1. Attach the ESD wrist strap to your wrist and to an available ESD socket or wrist strap terminal. 2. Remove the caps from the cage sockets on the FortiGate 6000F front panel. 3. Hold the sides of the transceiver and slide it into the cage socket until it clicks into place. FortiGate 6000F Series 7.0.12 System Guide 36
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
36
Getting started with FortiGate 6000F series This section is a quick start guide to connecting and configuring a FortiGate 6000F for your network. Before using this chapter, your FortiGate 6000F should be mounted and connected to your grounding and power system. In addition, your FortiGate 6000F should be powered up and the front and back panel LEDs should indicate normal operation. When your FortiGate 6000F is operating normally, the front panel LEDs should appear as follows. LED State Status Green Alarm Off HA Off Power Green Connected network interfaces Solid or flashing green. During normal operation, the back panel PSU and fan try LEDs should all be solid green. This indicates that each component has power and is operating normally. Once the system has initialized, you have a few options for connecting to the FortiGate 6000F GUI or CLI: l Log in to the management board GUI by connecting MGMT1 or MGMT2 to your network and browsing to https://192.168.1.99 or https://192.168.2.99. l Log in to the management board CLI by connecting MGMT1 or MGMT2 to your network and using an SSH client to connect to 192.168.1.99 or 182.168.2.99. l Log in to the management board CLI by connecting to the RJ-45 RS-232 CONSOLE port with settings: BPS: 9600, data bits: 8, parity: none, stop bits: 1, flow control: none. The FortiGate 6000F ships with the following factory default configuration. Option Default Configuration Administrator Account User Name admin Password (none) For security reasons you should add a password to the admin account before connecting the FortiGate 6000F to your network. From the GUI, access the Global GUI and go to System > Administrators, edit the admin account, and select Change Password. From the CLI: config global config system admin edit admin set password <new-password> end FortiGate 6000F Series 7.0.12 System Guide 37 Fortinet Technologies Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
37
Getting started with FortiGate 6000F series Fortinet Technologies Inc. Option Default Configuration MGMT1 IP/Netmask 192.168.1.99/24 MGMT2 IP/Netmask 192.168.2.99/24 All configuration changes must be made from the management board GUI or CLI and not from individual FPCs. All other management communication (for example, SNMP queries, remote logging, and so on) use the MGMT1 or MGMT2 interfaces and are handled by the management board. Confirming startup status Before verifying normal operation and making configuration changes and so on you should wait until the FortiGate 6000F is completely started up and synchronized. This can take a few minutes. To confirm that theFortiGate 6000F is synchronized, you can refer to the Cluster Status dashboard widget. If the system is synchronized, the management board (slot 0) all of the FPCs (slots 1 to 6 or 1 to 10) should be visible and their Configuration Status should be In Sync. The Cluster Status dashboard widget also indicates if any FPCs are not synchronized. The FortiGate 6000F uses the Fortinet Security Fabric for communication and synchronization between the management board and the FPCs and for normal GUI operation. By default, the Security Fabric is enabled and must remain enabled for normal operation. You can also view the Sensor Information dashboard widget to confirm that the system temperatures are normal and that all power supplies and fans are operating normally. From the CLI you can use the diagnose sys confsync status | grep in_sy command to view the synchronization status of the management board and FPCs. If all of the FPCs are synchronized, each output line should include in_sync=1. If a line ends with in_sync=0, that FPC is not synchronized. The following example just shows a few output lines: diagnose sys confsync status | grep in_sy FPC6KF3E17900200, Secondary, uptime=5385.45, priority=119, slot_id=2:1, idx=2, flag=0x4, in_sync=1 F6KF313E17900031, Secondary, uptime=5484.74, priority=2, slot_id=1:0, idx=0, flag=0x10, in_sync=1 F6KF313E17900032, Primary, uptime=5488.57, priority=1, slot_id=2:0, idx=1, flag=0x10, in_sync=1 FPC6KF3E17900201, Secondary, uptime=5388.78, priority=120, slot_id=2:2, idx=2, flag=0x4, in_sync=1 F6KF313E17900031, Secondary, uptime=5484.74, priority=2, slot_id=1:0, idx=0, flag=0x10, in_sync=1 ... FortiGate 6000F Series 7.0.12 System Guide 38
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
38
Getting started with FortiGate 6000F series Fortinet Technologies Inc. Default VDOM configuration and configuring the management interfaces By default, when you first start up a FortiGate 6000F it is operating in Multi VDOM mode. The default Multi VDOM configuration includes the root VDOM and a management VDOM named mgmt-vdom. The mgmt1, mgmt2, mgmt3, ha1, and ha2 interfaces are in mgmt-vdom and all of the data interfaces are in the root VDOM. You cannot delete or rename mgmt-vdom. You also cannot remove interfaces from it or add interfaces to it. You can however, configure other settings such as routing required for management communication, interface IP addresses, and so on. You can also add VLANs to the interfaces in mgmt-vdom and create a LAG that includes the mgmt1 and mgmt2 interfaces. You can use the root VDOM for data traffic and you can also add more VDOMs for data traffic as required, depending on your Multi VDOM license. Changing data interface network settings To change the IP address of any FortiGate 6000F data interface: l From the GUI access the Global GUI and go to Network > Interfaces. Edit any interface to change its IP address and other settings. l From the CLI: config system interface edit <interface-name> set ip <ip-address> <netmask> end Resetting to factory defaults At any time during the configuration process, if you run into problems, you can reset the FortiGate 6000F to factory defaults and start over. From the management board CLI enter: config global execute factoryreset Restarting the FortiGate 6000F To restart the FortiGate 6000F, connect to the management board CLI and enter the execute reboot command. After you enter this command, the management board and all of the FPCs restart. To restart an individual FPC, log in to the CLI of that FPC and run the execute reboot command. FortiGate 6000F Series 7.0.12 System Guide 39
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
39
Getting started with FortiGate 6000F series Fortinet Technologies Inc. Changing the FortiGate 6001F, FortiGate 6501F, or FortiGate 6301F log disk and RAID configuration The FortiGate 6001F, FortiGate 6501F, or FortiGate 6301F include two internal 1-TByte log disks. By default the disks are in a RAID-1 configuration. In the RAID-1 configuration you can use the disks for disk logging only. You can use the execute disk raid command to disable RAID and use one of the disks for disk logging and the other for other purposes such as disk caching. You can also change the RAID level to RAID-0. Changing the RAID configuration deletes all data from the disks and can disrupt disk logging so a best practice is set the RAID configuration when initially setting up the FortiGate 6001F, FortiGate 6501F, or FortiGate 6301F. From the CLI you can use the following command to show disk status: execute disk list Use the following command to disable RAID: execute disk raid disable RAID is disabled, the disks are separated and formatted. Use the following command to change the RAID level to RAID-0: execute disk raid rebuild-level 0 The disks are formatted for RAID-0. Use the following command to rebuild the current RAID partition: execute disk raid rebuild The RAID is rebuilt at the current RAID level. Use the following command to show RAID status. The following command output shows the disks configured for RAID-1. execute disk raid status RAID Level: Raid-1 RAID Status: OK RAID Size: 1000GB Disk 1: OK Used 953GB Disk 2: OK Used 953GB FortiGate 6000F Series 7.0.12 System Guide 40
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf
40
Managing individual FortiGate 6000F management boards and FPCs You can manage individual FPCs using special management port numbers, FPC consoles, or the execute load￾balance slot manage command. You can also use the execute ha manage command to log in to the other FortiGate 6000F in an HA configuration. Special management port numbers You may want to connect to individual FPCs to view status information or perform a maintenance task, such as installing firmware or performing a restart. You can connect to the GUI or CLI of individual FPCs (or the management board) using the MGMT1 interface IP address with a special port number. You can use the config load-balance setting slbc-mgmt-intf command to change the management interface used. The default is mgmt1 and it can be changed to mgmt2, or mgmt3. To enable using the special management port numbers to connect to individual FPCs, set slbc-mgmt-intf to an interface that is connected to a network, has a valid IP address, and has management or administrative access enabled. To block access to the special management port numbers you can set slbc-mgmt-intf to an interface that is not connected to a network, does not have a valid IP address, or has management or administrative access disabled. For example, if the MGMT1 interface IP address is 192.168.1.99 you can connect to the GUI of the first FPC (the FPC in slot 1) by browsing to : https://192.168.1.99:44301 The special port number (in this case, 44301) is a combination of the service port (for HTTPS, the service port is 443) and the FPC slot number (in this example, 01). You can view the special HTTPS management port number for and log in to the GUI of an FPC from the Configuration Sync Monitor. The following table lists the special ports you can use to connect to individual FPCs or the management board using common management protocols. The FortiGate 6300F and 6301F have 7 slots (0 to 6) and the FortiGate 6500F , 6501F, and 6001F have 11 slots (0 to 10). Slot 0 is the management board (MBD) slot. Slots 1 to 10 are FPC slots. You can't change the special management port numbers. Changing configurable management port numbers, for example the HTTPS management port number (which you might change to support SSL VPN), does not affect the special management port numbers. FortiGate 6000F Series 7.0.12 System Guide 41 Fortinet Technologies Inc.
https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/ffef9904-1a11-11e9-9685-f8bc1258b856/fortigate-6000F-system-guide.pdf