0% found this document useful (0 votes)
427 views

Fortiauthenticator v5.1.0 Release Notes

fa-5.1.0

Uploaded by

Andrew Webb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
427 views

Fortiauthenticator v5.1.0 Release Notes

fa-5.1.0

Uploaded by

Andrew Webb
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

FortiAuthenticator - Release Notes

VERSION5.1.0
FORTINET DOCUMENTLIBRARY
http://docs.fortinet.com

FORTINETVIDEOGUIDE
http://video.fortinet.com

FORTINETBLOG
https://blog.fortinet.com

CUSTOMERSERVICE&SUPPORT
https://support.fortinet.com

http://cookbook.fortinet.com/how-to-work-with-fortinet-support/

FORTIGATECOOKBOOK
http://cookbook.fortinet.com

FORTINETTRAININGSERVICES
http://www.fortinet.com/training

FORTIGUARDCENTER
http://www.fortiguard.com

FORTICAST
http://forticast.fortinet.com

ENDUSER LICENSE AGREEMENT


http://www.fortinet.com/doc/legal/EULA.pdf

FORTINET PRIVACY POLICY


https://www.fortinet.com/corporate/about-us/privacy.html

FEEDBACK
Email: [email protected]

11/01/2017

FortiAuthenticator 5.1.0 - Release Notes

Revision 1
TABLEOFCONTENTS

Introduction 4
Special Notices 5
TFTP boot process 5
Monitor settings for web-based manager access 5
Before any upgrade 5
After any upgrade 5
What's New 6
Upgrade Instructions 9
Hardware & VM support 9
Image checksums 9
Upgrading from FortiAuthenticator v4.0 10
Product Integration and Support 12
Web browser support 12
FortiOS support 12
Fortinet agent support 12
Virtualization software support 13
Third party RADIUS authentication 13
Resolved Issues 14
Known Issues 18
Appendix A:FortiAuthenticator VM 20
FortiAuthenticator VM system requirements 20
FortiAuthenticator VM firmware 20
Appendix B:Maximumvalues 21
Hardware appliances 21
VMappliances 23
Introduction

This document provides a summary of new features, enhancements, support information, installation
instructions, caveats, and resolved and known issues for FortiAuthenticator 5.1.0, build 0083.

FortiAuthenticator is a User and Identity Management solution that provides Strong Authentication, Wireless
802.1X Authentication, Certificate Management, and Fortinet Single Sign-On.

For additional documentation, please visit:

http://docs.fortinet.com/fortiauthenticator/

4 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Special Notices

TFTP boot process

The TFTP boot process erases all current FortiAuthenticator configuration and replaces it with the factory default
settings.

Monitor settings for web-based manager access

Fortinet recommends setting your monitor to a screen resolution of 1600x1200. This allows for all the objects in
the Web-based Manager to be viewed properly without need for scrolling.

Before any upgrade

Save a copy of your FortiAuthenticator unit configuration prior to upgrading. Go to System > Dashboard > Status
and select Backup/Restore >Download backup file to backup the configuration.

After any upgrade

If you are using the Web-based Manager, clear your browser cache prior to login on the FortiAuthenticator to
ensure the Web-based Manager screens are displayed properly.

FortiAuthenticator 5.1.0 Release Notes 5


Fortinet Technologies Inc.
What's New

Before upgrading, review the following changes for impact to your unique deployment. Note that this list is not
exhaustive but highlights the major feature enhancements in this release.

Note that this is a patch release which fixes a few issues found in the release of 5.0.0. See Resolved Issues for
the issues addressed in this patch release.

For more detailed information, see the FortiAuthenticator 5.1.0 Administration Guide.

New features include:

FSSO: Update group cache (435530) (435591)


A new refresh/update group information feature has been introduced. Once a user's group membership changes,
the particular user's information can be manually updated by selecting the button, in an effort to update the user's
group information right away. This will not require the user logging off and back on.

NTLMperformance (437004) (443951)


NTLM performance has been improved by supporting simultaneous usage of multiple DCs to process
authentication, allowing as many as 300 authentications per second with three DCs.

Remote LDAP: Oracle ODSEE support (412856)


Oracle-based ODSEE LDAP support has been enhanced. When the remote LDAP server is Oracle ODSEE, the
group search is not allowed unless the LDAP bind is done using the administrator credentials. We added a new
option to the remote LDAP server configuration to indicate whether the group filter search must be done using the
administrator bind (disabled by default).

Guest Portals: Menu change and customization


Many of the pre-login replacement messages for Guest Portals in FortiAuthenticator 5.0.0 are shared with the
Self-service Portal. This meant that customization of those replacement messages applied to both portals. In
order to decouple these features, a number of replacement messages have been added to the Guest Portals list
of replacement messages.

The post-login page for users of the Guest Portal was also similar to the Self-service's Portal page, with a menu
sidebar on the left and the selected menu page on the right. In 5.1.0, the left sidebar has been removed in the
effort to make it similar to the social login portal.

Once logged into the Guest Portal, users will have the opportunity to edit their profile (including name, email
address, phone number, and address), configure password recovery options (including a change their password,
and setup a security question), and register a FortiToken. These options can be made visible to the user or not by
configuring Post-login Services under Authentication > Guest Portals > Portals.

Guest Portals: FortiWLC support


Guest Portals now includes support for the Meru Connect (support which already existed for Captive Portal). This
allows the FortiAuthenticator to auto-detect when requests are coming from the Meru Connect, so no new
configuration settings are required in the GUI.

6 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
What's New

SAML IdP: Support new attributes for assertions (445274)


New assertion user attributes (including FirstName, LastName, and Remote LDAP Group) are now available to
return to a Service Provider (SP) when configuring the SAML IdP service under Authentication >SAML IdP >
Service Providers.

SAML IdP: Office365 support (423462)


Integration with Office 365 and Windows Azure AD requires a unique identifier for each user in the user directory.
Windows Azure AD Service refers to this as the ImmutableID, which typically can be set to the ObjectGUID
attribute. This new attribute is available when configuring Assertion Attributes under Authentication > SAMLIdP
> Service Providers.

Guest Portals: 2FA and single NAS support


Guest Portals now support user's ability to enter their FortiToken code upon Guest Portal login (this includes push
token and WLC support).

Note: Two-factor authentication is not supported for Guest Portal with FortiCloud.

FSSO: Multiple group support for Syslog (416541)


The Syslog Matching Rules, under Fortinet SSO Methods > SSO>Syslog Sources, now have a Group list
separator option. Before now, the SSO syslog feed could only parse multiple groups if the names were separated
by a plus (+) symbol. Support has been added for commas (,) also.

Strong Crypto (401581)


A configurable option to require strong cryptography is now available under System > Administration > System
Access. Enable this option to restrict administrative access using stronger cryptographic algorithms, such as TLS
1.2, DHE, AES, and SHA256.

MAC device filtering


New MACdevice filtering can be configured in Device Authentication under Authentication >RADIUSService
> Clients, where MAC address attributes, authorized groups, and action to take for unauthorized devices can be
determined. The MAC address attribute indicates which RADIUS attribute to extract the MAC address from.

Note that authorized groups must be first created under Authentication >User Management > User Groups,
where Type must be set to MAC , and MAC devices are selected for MAC address authorization. These can then
be referenced in the RADIUS client configuration page, where they are now mandatory.

MACdevice filtering can be enabled for anyRADIUS authentication, including Guest Portal authentication.
However, when used for Guest Portals, the FortiAuthenticator needs to know which HTTP parameter to extract
the MAC address from.You can now enter the MAC device HTTP parameter under the Authentication >Guest
Portals > Portals configuration page.

API: Independent access control (414153)


Access rights have been modified, under System >Network >Interfaces, to allow independent control for GUI
administrator and RESTAPI access via HTTPS.

Samba upgrade (414084)


Server Message Block version 2 (SMBv2) is now supported (SMBv1 is still configurable).

FortiAuthenticator 5.1.0 Release Notes 7


Fortinet Technologies Inc.
What's New

Guest Portals: FortiCloud support (443300)


FortiCloud now offers the ability to manage AP's, effectively replacing the need for a physical FortiGate for
customers who don't need its full set of features. As part of the SSID configuration, FortiCloud offers an external
captive portal as an authentication method.

Multiple FortiAuthenticator guest portals are supported, where the FortiAuthenticator will act as the guest portal
host and RADIUS server.

Note: Two-factor authentication is not supported for Guest Portal with FortiCloud.

NTLMv2 support (442566)


You can optionally disable NTLMv1 in the client authentication to Windows AD server configuration under
Fortinet SSOMethods >SSO > General.

SCEP enhancements (449810)


You can now either accept or reject SCEP renewal requests for expired and revoked certificates, as burst renewal
requests from FortiGates would exhaust the FortiAuthenticator and create duplicate certificates. New checkboxes
in the Renewal section, under Certificate Management >SCEP>Enrollment Requests, allow you to permit
renewals after certificate revocation and/or expiration.

FSSO: Chromebook logout support for SAML SP (444110)


A new logout button is provided to Chromebook users that will sign them off, successfully terminating the
FortiAuthenticator's SAML SP and the end-user's FSSO session.

This can be viewed in the SAMLSP(FSSO) section under Authentication >Self-service Portal >Replacement
Messages, where login and logout replacement messages for SAML authentication can be configured. The
logout page can be accessed and configured by going to https://<FAC IP or FQDN>/saml-
auth/logout/.

Included in these settings is a successful logout replacement message, which confirms to end-users that the
logout was successful.

Note: If you wish to redirect users to another URL upon a successful logout, you can
replace specially-inserted placeholder text with the desired URL.

The following placeholder text can be found in the HTML section of SAMLSPLogout
Success Page:
<!-- For some providers it is possible to clear the SAML
iDP session just by redirecting the user directly to a
logout page. You can accomplish this by replacing the src
URL in the hidden iframe below. E.g.: Google:
https://accounts.google.com/Logout Okta:
https://yourdomain.okta.com/login/signout -->

8 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Upgrade Instructions

Back up your configuration before beginning this procedure. While no data loss should
occur if the procedures below are correctly followed, it is recommended a full backup is
made before proceeding and the user will be prompted to do so as part of the upgrade
process.

For information on how to back up the FortiAuthenticator configuration, see the


FortiAuthenticator Administration Guide.

Customers may experience an issue when upgrading FortiAuthenticator from v5.0.0


to v5.1.0. Possible issues may include database corruption, login prevention, loss of
GUI access and may require a factory reset.

This issue may be encountered when guest portals have been configured in
FortiAuthenticator prior to upgrade.

Workaround: Start from v5.0.0 (b0012), delete the guest portal configuration,
upgrade to v5.1.0 (b0083) and re-create the guest portal configuration.

Hardware & VM support

FortiAuthenticator 5.1.0 supports:

l FortiAuthenticator 200D
l FortiAuthenticator 200E
l FortiAuthenticator 400C
l FortiAuthenticator 400E
l FortiAuthenticator 1000C
l FortiAuthenticator 1000D
l FortiAuthenticator 2000E
l FortiAuthenticator 3000B
l FortiAuthenticator 3000D
l FortiAuthenticator 3000E
l FortiAuthenticator VM (VMWare, Hyper-V, KVM, and Xen)

Image checksums

To verify the integrity of the firmware file, use a checksum tool to compute the firmware files MD5 checksum.
Compare it with the checksum indicated by Fortinet. If the checksums match, the file is intact.

MD5 checksums for software releases are available from Fortinet Customer Service & Support:

FortiAuthenticator 5.1.0 Release Notes 9


Fortinet Technologies Inc.
Upgrading from FortiAuthenticator v4.0 Upgrade Instructions

https://support.fortinet.com

Customer Service & Support image checksum tool

After logging in to the web site, in the menus at the top of the page, click Download, then click Firmware Image
Checksums.
Alternatively, near the bottom of the page, click the Firmware Image Checksums button. (The button appears
only if one or more of your devices has a current support contract.) In the File Name field, enter the firmware
image file name including its extension, then click Get Checksum Code.

Upgrading from FortiAuthenticator v4.0

FortiAuthenticator 5.1.0 build 0083 officially supports upgrade from all versions of FortiAuthenticator 4.x.x.

Upgrading the FortiAuthenticator 3000D from 4.0.x to 4.1.x is not supported. The
workaround for this model is to upgrade from any 4.0.x version directly to 4.2.0 or
higher (skipping all 4.1.x versions).

If you install 4.1.x firmware on a FortiAuthenticator 3000D it stops responding. You


can get the system running again by restoring valid firmware using the TFTP boot
process.

Firmware upgrade process


First, back up your configuration, then follow the procedure below to upgrade the firmware.

10 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Upgrade Instructions Upgrading from FortiAuthenticator v4.0

Before you can install FortiAuthenticator firmware, you must download the firmware package from the
Customer Service & Support web site, then upload it from your computer to the FortiAuthenticator unit.

1. Log in to the Customer Service & Support web site at https://support.fortinet.com. In the Download section of the
page, select the Firmware Images link to download the firmware.
2. To verify the integrity of the download, go back to the Download section of the login page, then click the Firmware
Image Checksums link.
3. Log in to the FortiAuthenticator units Web-based Manager using the admin administrator account.
4. Go to System > Dashboard > Status.
5. In the System Information widget, in the Firmware Version row, select Upgrade. The Firmware Upgrade or
Downgrade dialog box opens.
6. In the Firmware section, select Choose File, and locate the upgrade package that you downloaded.
7. Select OK to upload the file to the FortiAuthenticator.
Your browser uploads the firmware file. The time required varies by the size of the file and the speed of your
network connection. When the file transfer is complete, the following message is shown:

It is recommended that a system backup is taken at this point. Once complete, click Start Upgrade.

Wait until the unpacking, upgrade and reboot process completes (usually 3-5 minutes), then refresh the page.

FortiAuthenticator 5.1.0 Release Notes 11


Fortinet Technologies Inc.
Product Integration and Support

Web browser support

The following web browsers are supported by FortiAuthenticator 5.1.0:

l Microsoft Internet Explorer versions 9 to 11


l Microsoft Edge 38
l Mozilla Firefox versions 18 to 54
l Google Chrome versions 28 to 59 (see note below)

Special Note for Google Chrome users

There is a known bug which exists in Google Chrome versions 44 and 45 where initially
the GUI loads correctly, however after some time, pages will stop loading with the
error on the chrome debug console "Failed to load resource: net::ERR_INSECURE_
RESPONSE".

This is a known issue and affects all sites using self-signed certificates and is fixed in
Google Chrome version 46. Chrome bug reference:
https://code.google.com/p/chromium/issues/detail?id=516808

To work around this issue in the meantime, use a different browser or Upgrade to the
Chrome Beta Channel.

Other web browsers may function correctly, but are not supported by Fortinet.

FortiOS support

FortiAuthenticator 5.1.0 supports the following FortiOS versions:

l FortiOS v5.2.11
l FortiOS v5.4.5
l FortiOS v5.6.0
Other FortiOS versions may function correctly, but may not be supported by Fortinet.

Fortinet agent support

FortiAuthenticator 5.1.0 supports the following Fortinet Agents:

l FortiClient v.5.x for Microsoft Windows (Single Sign-On Mobility Agent)


l FortiAuthenticator Agent for Microsoft Windows 2.0.2

12 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Product Integration and Support Virtualization software support

l FortiAuthenticator Agent for Outlook Web Access 1.4.0


l FSSO DC Agent v.5.x
l FSSO TS Agent v.5.x
Other Agent versions may function correctly, but may not be supported by Fortinet.

For details of which Operating Systems are supported by each Agent, please see the Install Guides provided with
the software.

Virtualization software support

FortiAuthenticator 5.1.0 supports:

l VMware ESXi / ESX 4.0, 4.1, 5.0, 5.1, 5.5 and 6.0
l Microsoft Hyper-V 2010 and Microsoft Hyper-V 2012 R2
l Linux Kernel-based Virtual Machine (KVM) on Virtual Machine Manager and QEMU 2.5.0
l Xen Virtual Machine (for Xen HVM and AWS)

Support for HA in Active-Passive and Active-Active modes has not been confirmed on
the FortiAuthenticator for Xen VM at the time of the release.

See Appendix A:FortiAuthenticator VM for more information.

Third party RADIUS authentication

FortiAuthenticator uses standards based RADIUS for authentication and can deliver two-factor authentication via
multiple methods for the greatest compatibility:

l RADIUS Challenge Response- Requires support by third party vendor


l Token Passcode Appended - Supports any RADIUS compatible system
FortiAuthenticator should therefore be compatible with any RADIUS capable authentication client / network
access server (NAS). For more information, see the FortiAuthenticator Two-Factor Authentication Interoperability
Guide.

FortiAuthenticator 5.1.0 Release Notes 13


Fortinet Technologies Inc.
Resolved Issues

The resolved issues listed below may not list every bug that has been corrected with this release. For inquiries
about a particular bug, please Fortinet Customer Service & Support:

https://support.fortinet.com.

This patch release fixes the following issues found in the release of 5.0.0.

Bug ID Category Description

448560 Admin GUI Cannot create user groups.

384874 Admin GUI B0081: unable to login to FortiAuthenticator GUI.

454046 Admin GUI Expanding OU node on Remote LDAP server often produces the following
error: Query failed: 'NoneType' object is not iterable.

452778 Admin GUI Custom dictionary breaks GUI login.

449300 Admin GUI Set password email link expires after 1 day when creating local users from CSV
import.

449111 Admin GUI Creating new user with random password fails.

437735 Admin GUI "Token Resend" gives successful message by mistake.

439458 Admin GUI The rad_accounting daemon doesn't restart (or reload config) when"expire
inaction accounting sessions" timeout is changed.

416807 Admin GUI The test filter viewing can't display all LDAP entries.

439841 Admin GUI Custom RADIUS dictionary does not support pre-defined attribtue values.

434426 Admin GUI Deleting a custom radius vendor returns success message stating that N
vendors have been deleted (where N = # of attributes + 1).

451283 Admin GUI SAML SP: Inaccurate mouse-over help text.

451002 Admin GUI Remove references to Meru.

439629 Admin GUI Guest user creating handles the error ungracefully.

434595 Admin GUI When creating guest users fails due to invalid CSV file, the error message gets
hidden because the focus of the page changes.

438476 Admin GUI Admin options are displayed in remote users.

14 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Resolved Issues

Bug ID Category Description

437875 Admin GUI Cannot cancel/close guest user creation dialog.

439969 Admin GUI Invalid file in radius vendor creation gives Django error.

440255 Admin GUI GUI Packet Capture not working.

399856 Admin GUI Error message on login page should not say 'All fields are case-sensitive' since
the Username field isn't.

439465 Admin GUI Can't login to GUI after some time in FAC 5.0.

436525 Admin GUI User DN Field limit to 255 characters.

438396 Captive Portal NAS not allowed for access point's IP configured for authentication for
credentials portal.

440645 Certificate UTF8 support in Certificates.


Management

442176 FSSO SSO failed to connect to LDAP server.

435530 FSSO Delay in SSO session Creation (Logon Cache update) on FAC using DC Agent
Mode.

446273 FSSO Not able to retrieve Global Catalog database in "Fortigate Filtering" under
FSSO Method.

444655 FSSO SSO User Session Disappear from the SSO User Session list.

450110 FSSO Lower default LDAP server response timeout.

438225 FTM RADIUS initiated Push not working.

447103 FTM FAC sending token activation email after FortiCare returns error.

452856 Guest Portal Show guest portal URL on config page.

439038 Guest Portal Remaining bugs in self-registration service of guest portal.

451455 Guest Portal Guest portal troubleshooting help.

451454 Guest Portal Mouse over for guest portal pre/post-login services.

451448 Guest Portal Typo in log error message when Guest Portal profile is not fount.

440609 Guest Portal B0012: FAC Guest Portal Rules configuration appears incomplete.

442900 HA Remote Radius Administrator causing HA Sync anomalies with LB Slave.

FortiAuthenticator 5.1.0 Release Notes 15


Fortinet Technologies Inc.
Resolved Issues

Bug ID Category Description

439823 HA HA our of Synch with FortiAuthenticator.

417312 HA Disabling HA on low-priority FAC in HA cluster fails.

440206 HA Enabling HA on FAC with several thousand remote LDAP users causes the
FAC to become unresponsive.

446989 HA Stale user data can interfere with LB sync or rebuild tables.

452419 RADIUS [TKT 2328649] Voice VLAN is not injected by Radius Attribute on MAB.
Authentication

435094 RADIUS FAC Version 4.3.2 Build 222 MAC Authentication Bypass does not work with
Authentication DELL Switch N-Series.

444206 RADIUS Certificate parsing fails during 802.1x authentication if there is a forward slash
Authentication in the OU.

437312 RESTAPI Random password expires immediately when local user created via REST API.

404797 RESTAPI Uncalled for Push is sent after invoking auth api call.

443935 SCEP B0226: Under lab. stress, GUI display "An error has occurred". Probable
database connection exhaustion error.

447745 SCEP B0226: SCEP renewal anomalies.

440338 SCEP B0012: SCEP enrollment doesnt work - cant generate certificate from FMG.

450068 Security FortiAuthenticator - tcpdump need upgrade to 4.9.2.

452483 Security Release of dnsmasq-2.78, fixes CVE-2017-14491.

423286 Security Advisory: Using X-XSS-Protection HTTP secure header block reflected XSS
attacks.

416921 Security CVE-2016-10229 Linux Kernel ipv4/udp.c Remote Code Execution


Vulnerability.

413933 Security Unify Web Server Banner among FortiProducts.

409889 Security CVE-2017-6214 Linux Kernel "tcp_splice_read()" Denial of Service


Vulnerability.

401618 Security Kernel: Signed overflows in SO_{SND|RCV}BUF in sock_setsockopt().

441283 Security FreeRADIUS vulnerabilities - July 17, 2017 (CVE-2017-10978, CVE-2017-


10979).

16 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Resolved Issues

Bug ID Category Description

441022 Security Apache httpd need upgrade to 2.4.27.

452513 SMS FortiGuard SMS not working.

408883 SMS SMS with third party vendors generates errors for other HTTP status code than
200.

434597 Sponsor Sponsor user cannot download debug error report.


Portal

392437 SSH B0081: SSH FAC login fails using CHAP/MS.CHAP/MS.CHAPv2


authentication to Cisco ACS remote radius users.

452545 Usage Profile rad_accounting not starting when enabling usage profile feature.

439303 Xen VM Openvpn and message-based debug didn't work on AWS VM.

FortiAuthenticator 5.1.0 Release Notes 17


Fortinet Technologies Inc.
Known Issues

Known Issues

This section lists the known issues of this release, but is not a complete list. For inquires about a particular bug,
please contact Fortinet Customer Service & Support:

https://support.fortinet.com

BugID Category Description

457980 Firmware Firmware upgrade from 5.0 (b0012) failure if guest portals configured
Upgrade

409345 GUI When the Self-service Portal is enabled, a user (remore user) with admin access
can not log into FAC with 2factor.

448468 GUI Adding french accents in Replacement messages causes the message to display
incorrectly

452042 GUI Using IE11 to display/export the Guest user info doesn't work properly

450478 SAML IdP SAML IdP login failed for user with long DN

436030 SAML IdP SAML IdP: Signature verification error on logout

400466 SAML IdP SAML IDP: support signed auth request with embedded signature

451841 Windows FAC Agent service fails to start and/or disconnects after windows update
Agent

404902 Windows FortiAuthenticator Agent for MSWindows: Domain Name contains Hyphen
Agent doesn't work correctly

310257 OWA Agent IIS Agent log grows unlimited

394402 OWA Agent OWA Agent does not work with Exchange 2016

457470 Certificate FAC doesn't create the SAN DNS request


Management

452878 Certificate Incorrect number of revocated certificates in CRLs


Management

452021 Certificate Incomplete certificate info in certificate expiration warning email message
Management

451789 FSSO RSSO not working with subdomain user via Global Catalog

452322 FSSO FAC Halts/Impedes the Authentication process.

18 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Known Issues

BugID Category Description

450441 FSSO Secondary LDAP server is not used for RSSO group resolution

414100 RADIUS FAC losts RADIUS connection after retriving its connection between Hyber-V
FAC and it's virtual disks located on SAN.

445101 LDAP Sync LDAP sync overloads box during connectivity failure

FortiAuthenticator 5.1.0 Release Notes 19


Fortinet Technologies Inc.
FortiAuthenticator VM system requirements Appendix A:FortiAuthenticator VM

Appendix A:FortiAuthenticator VM

FortiAuthenticator VM system requirements

The following table provides a detailed summary on FortiAuthenticator VM system requirements. Installing
FortiAuthenticator VM requires that you have already installed a supported virtual machine (VM) environment.
For details, see the Install Guide for FortiAuthenticator VM available at http://docs.fortinet.com.

VMRequirements

Virtual Machine Requirement

Virtual Machine Form Factor Open Virtualization Format (OVF)

Virtual CPUs Supported (Minimum / Maximum) 1/8

Virtual NICs Supported (Minimum / Maximum) 1/4

Storage Support (Minimum / Maximum) 60GB / 2TB

Memory Support (Minimum / Maximum) 512 MB / 64GB

High Availability Support Yes

FortiAuthenticator VM firmware

Fortinet provides FortiAuthenticator VM firmware images in two formats:

l .out
Use this image for new and upgrades to physical appliance installations. Upgrades to existing virtual machine
installations are also distributed in this format.
l ovf.zip
Use this image for new VM installations. It contains a deployable Open Virtualization Format (OVF) virtual machine
package for initial VMware ESXi installations.
For more information see the FortiAuthenticator product datasheet available on the Fortinet web site,
http://www.fortinet.com/products/fortiauthenticator/index.html.

20 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Appendix B:Maximumvalues

This section lists the maximum number of configuration objects per FortiAuthenticator appliance that can be
added to the configuration database for different FortiAuthenticator hardware and VM configurations.

The maximum values in this document are the maximum configurable values and are
not a commitment of performance.

Hardware appliances

The following table describes the maximum values set for the various hardware models.

Feature FortiAuthenticator Model

200E 400E 1000D 2000E 3000E

System

Network Static Routes 50 50 50 50 50

Messages SMTP Servers 20 20 20 20 20

SMS Gateways 20 20 20 20 20

SNMP Hosts 20 20 20 20 20

Administration SYSLOG Servers 20 20 20 20 20

User Uploaded Images 30 100 500 1000 2000

Language Files 50 50 50 50 50

Realms 20 80 400 800 1600

Authentication

General Auth Clients (NAS) 166 666 3333 6666 13333

FortiAuthenticator 5.1.0 Release Notes 21


Fortinet Technologies Inc.
Hardware appliances Appendix B:Maximumvalues

Feature FortiAuthenticator Model

200E 400E 1000D 2000E 3000E

Users
500 2000 10000 20000 40000
(Local + Remote)1

User Radius Attributes 1500 6000 30000 60000 120000

User Groups 50 200 1000 2000 4000

Group Radius Attributes 150 150 600 6000 120000

FortiTokens 1000 4000 20000 40000 80000

FortiToken Mobile 200 200 200 200 200


Licenses2

LDAP Entries 1000 4000 20000 40000 80000

Device (MAC-based Auth.) 50 200 1000 2000 4000

RADIUS Client Profiles 500 2000 10000 20000 40000

Remote LDAP Servers 20 80 400 800 1600

Remote LDAP Sync Rule 25 100 500 1000 2000

Remote LDAP User 1500 6000 30000 60000 120000


Radius Attributes

FSSO & Dynamic Policies

FSSO FSSO Users 500 2000 10000 20000 2000003

FSSO Groups 1000 1000 5000 10000 20000

Domain Controllers 10 20 100 200 400

RADIUS Accounting SSO


166 666 3333 6666 13333
Clients

FortiGate Services 50 200 1000 2000 4000

FortiGate Group Filtering 250 1000 5000 10000 20000

FSSO Tier Nodes 5 20 100 200 400

IP Filtering Rules 250 1000 5000 10000 20000

22 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Appendix B:Maximumvalues VMappliances

Feature FortiAuthenticator Model

200E 400E 1000D 2000E 3000E

Accounting Sources 500 2000 10000 20000 40000


Proxy
Destinations 25 100 500 1000 2000

Rulesets 25 100 500 1000 2000

Certificates

User User Certificates 2500 10000 50000 100000 200000


Certificates
Server Certificates 50 200 1000 2000 4000

Certificate CA Certificates 10 10 50 50 50
Authorities
Trusted CA Certificates 200 200 200 200 200

Certificate Revocation 200 200 200 200 200


Lists

SCEP Enrollment Requests 2500 10000 50000 100000 200000

1 Note that there is one metric used for the number of allowed users which is Users . Local Users and Remote

Users share the same limit value. This enables Local Users or Remote Users to be equal to Users or for there to
be a mixture of user types, however, the total number of Local and Remote Users cannot exceed the Users
metric.
2 FortiToken Mobile Licenses refers to the licenses that can be applied to a FortiAuthenticator, not the number

of FortiToken Mobile instances that can be managed. The total number is limited by the FortiToken metric.
3 For the 3000E, the total number of concurrent SSO Users is set to a higher level to cater for large
deployments.

VMappliances

The FortiAuthenticator-VM Appliance is licensed based on the total number of users and licensed on a stacking
basis. All installations must start with a FortiAuthenticator VM-Base license and users can be stacked with
upgrade licenses in blocks of 100, 1,000, 10,000 and 100,000 users. Due to the dynamic nature of this licensing
model, most other metrics are set relative to the number of licensed users. The Calculating Metric column below
shows how the feature size is calculated relative to the number of licensed users for example, on a 100 user
FortiAuthenticator-VM Base License, the number of Auth Clients (NAS Devices) that can authenticate to the
system is:

100 / 10 = 10
Where this relative system is not used e.g. for static routes, the calculating metric is denoted by a -. The
supported figures are shown for both the base VM and a 5000 user licensed VM system by way of example.

FortiAuthenticator 5.1.0 Release Notes 23


Fortinet Technologies Inc.
VMappliances Appendix B:Maximumvalues

MaximumValues - VirtualMachines

Feature Model

Unlicensed Calculating Base VM Example 5000


VM Metric (100 Users) licensed User VM

System

Network Static Routes 2 50 50 50

Messaging SMTP Servers 2 20 20 20

SMS Gateways 2 20 20 20

SNMP Hosts 2 20 20 20

Administration SYSLOG Servers 2 20 20 20

User Uploaded Images 5 Users / 20 5 100

Language Files 5 50 50 50

Authentication

General Auth Clients (NAS) 3 Users / 3 33 1666

User Users 5 *********** 100 5000


Management (Local + Remote)1

User RADIUS Attributes 15 Users x 3 300 15000

User Groups 3 Users / 10 10 500

Group RADIUS
9 Users x 3 300 15000
Attributes

FortiTokens 10 Users x 2 200 10000

FortiToken Mobile
3 200 200 200
Licenses (Stacked) 2

LDAP Entries 20 Users x 2 200 10000

Device (MAC-based
1 Users / 10 10 500
Auth.)

24 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Appendix B:Maximumvalues VMappliances

Feature Model

Unlicensed Calculating Base VM Example 5000


VM Metric (100 Users) licensed User VM

RADIUSClient Profiles 3 Users 100 10000

Remote LDAP Servers 4 Users / 25 4 200

Remote LDAP Sync 1 Users / 20 5 250


Rule

Remote LDAP User


15 Users x 3 300 15000
Radius Attributes

FSSO & Dynamic Policies

FSSO FSSO Users 5 Users 100 5000

FSSO Groups 30 Users / 2 50 2500

Users / 100
Domain Controllers 3 10 50
(min=10)

RADIUS Accounting 10 Users 100 5000


SSO Clients

FortiGate Services 2 Users / 10 10 500

FortiGate Group 30 Users / 2 50 2500


Filtering

Users /100
FSSO Tier Nodes 3 5 50
(min=5)

IP Filtering Rules 30 Users / 2 50 2500

Accounting Sources 3 Users 100 1000


Proxy
Destinations 3 Users / 20 5 250

Rulesets 3 Users / 20 5 250

Certificates

User User Certificates 5 Users x 5 500 25000


Certificates
Server Certificates 2 Users / 10 10 500

FortiAuthenticator 5.1.0 Release Notes 25


Fortinet Technologies Inc.
VMappliances Appendix B:Maximumvalues

Feature Model

Unlicensed Calculating Base VM Example 5000


VM Metric (100 Users) licensed User VM

Certificate CA Certificates 3 Users / 20 5 250


Authorities
Trusted CA Certificates 200 200 200 200

Certificate Revocation
5 200 200 200
Lists

SCEP Enrollment Requests 5 Users x 5 2500 10000

1 Note that there is one metric used for the number of allowed users which is Users . Local Users and Remote

Users share the same limit value. This enables Local Users or Remote Users to be equal to Users or for there to
be a mixture of user types, however, the total number of Local and Remote Users cannot exceed the Users
metric.
2 FortiToken Mobile Licenses refers to the licenses that can be applied to a FortiAuthenticator, not the number
of FortiToken Mobile instances that can be managed. The total number is limited by the FortiToken metric.

26 FortiAuthenticator 5.1.0 Release Notes


Fortinet Technologies Inc.
Copyright 2017 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinets General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features, or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

You might also like