Category Archives: FortiGate

FortiGate VM Deployment example – MS Hyper-V

Deployment example – MS Hyper-V

Once you have downloaded the FGT_VMxx_HV-v5-build0xxx-FORTINET.out.hyperv.zip file and extracted the package contents to a folder on your Microsoft server, you can deploy the VHD package to your Microsoft Hyper-V environment.

The following topics are included in this section:

Create the FortiGate VM virtual machine

Configure FortiGate VM hardware settings

Create the FortiGate VM virtual machine

To create the FortiGate VM virtual machine:

  1. Launch the Hyper-V Manager in your Microsoft server.

The Hyper-V Manager home page opens.

  1. Select the server in the right-tree menu. The server details page is displayed.
  2. Right-click the server and select New and select Virtual Machine from the menu. Optionally, in the Actions menu, select New and select Virtual Machine from the menu.

The New Virtual Machine Wizard opens.

  1. Select Next to create a virtual machine with a custom configuration.

The Specify Name and Location page is displayed.

  1. Enter a name for this virtual machine. The name is displayed in the Hyper-V Manager.

Select Next to continue. The Assign Memory page is displayed.

  1. Specify the amount of memory to allocate to this virtual machine. The default memory for FortiGate VM is 1GB (1024MB).

Select Next to continue. The Configure Networking page is displayed.

  1. Each new virtual machine includes a network adapter. You can configure the network adapter to use a virtual switch, or it can remain disconnected. FortiGate VM requires four network adapters. You must configure network adapters in the Settings

Select Next to continue. The Connect Virtual Hard Disk page is displayed.

  1. Select to use an existing virtual hard disk and browse for the vhd file that you downloaded from the Fortinet Customer Service & Support portal.

 

Select Next to continue. The Summary page is displayed.

  1. To create the virtual machine and close the wizard, select Finish.

Configure FortiGate VM hardware settings

Before powering on your FortiGate VM you must configure the virtual memory, virtual CPU, and virtual disk configuration to match your FortiGate VM license.

To configure settings for FortiGate VM on the server:

  1. In the Hyper-V Manager, locate the name of the virtual machine, right-click the entry, and select Settings from the menu. Optionally, you can select the virtual machine and select Settings in the Actions

The Settings page is displayed.

  1. Configure virtual processors, network adapters, and virtual hard drive settings.
  2. Select Apply to save the settings and then select OK to close the settings page.

FortiGate VM virtual processors

You must configure FortiGate VM virtual processors in the server settings page. The number of processors is dependent on your server environment.

Configure FortiGate VM virtual processors:

  1. In the Settings page, select Processor from the Hardware

The Processor page is displayed.

  1. Configure the number of virtual processors for the FortiGate VM virtual machine. Optionally, you can use resource controls to balance resources among virtual machines.
  2. Select Apply to save the settings.

FortiGate VM network adapters

You must configure FortiGate VM network adapters in the server settings page. FortiGate VM supports four network adapters.

Configure FortiGate VM network adapters:

  1. In the Settings page, select Add Hardware from the Hardware menu, select Network Adapter in the device list, and select the Add button.

The Network Adapter page is displayed.

  1. You must manually configure four network adapters for FortiGate VM in the settings page. For each network adapter, select the virtual switch from the drop-down list.
  2. Select Apply to save the settings.

FortiGate VM virtual hard disk

You must configure the FortiGate VM virtual hard disk in the server settings page.

If you know your environment will expand in the future, it is recommended to increase the hard disk size beyond 30GB. The VM license limit is 2TB.

Configure a FortiGate VM virtual hard drive:

  1. In the Settings page, select IDE Controller 0 > Hard Drive from the Hardware

The Hard Drive page is displayed.

  1. Select New to create a new virtual hard disk.

The New Virtual Hard Disk Wizard opens.

  1. This wizard helps you to create a new virtual hard disk.

Select Next to continue. The Choose Disk Format page opens.

  1. Select to use VHDX format virtual hard disks. This format supports virtual disks up to 64TB and is resilient to consistency issues that might occur from power failures. This format is not supported in operating systems earlier than Windows Server 2012. Note that FortiGate-VM does not support hard disks larger than 2TB.

Select Next to continue. The Choose Disk Type page opens.

  1. Select the type of virtual disk you want to use. Select one of the following disk types:
    • Fixed size: This type of disk provides better performance and is recommended for servers running applications with high levels of disk activity. The virtual hard disk file that is created initially uses the size of the virtual hard disk and does not change when data is deleted or added.
    • Dynamic expanding: This type of disk provides better use of physical storage space and is recommended for servers running applications that are not disk intensive. The virtual disk file that is created is small initially and changes as data is added.
    • Differencing: This type of disk is associated in a parent-child relationship with another disk that you want to leave intact. You can make changes to the data or operating system without affecting the parent disk, so that you can revert the changes easily. All children must have the same virtual hard disk format as the parent (VHD or VHDX).

Select Next to continue. The Specify Name and Location page opens.

  1. Specify the name and location of the virtual hard disk file. Use the Browse button to select a specific file folder on your server.

Select Next to continue. The Configure Disk page opens.

  1. Select to Create a new blank virtual hard disk and enter the size of the disk in GB. The maximum size is dependent on your server environment.

Select Next to continue. The Summary page opens.

  1. The summary page provides details of the virtual hard disk. Select Finish to create the virtual hard disk.
  2. Select Apply to save the settings and select OK to exit the settings page.

 

High Availability Hyper-V configuration                                                                                    Start the FortiGate VM


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

FortiGate VM High Availability VMware configuration

High Availability VMware configuration

If you want to combine two or more FortiGate-VM instances into a FortiGate Clustering Protocol (FGCP) High Availability (HA) cluster the VMware server’s virtual switches used to connect the heartbeat interfaces must operate in promiscuous mode. This permits HA heartbeat communication between the heartbeat interfaces. HA heartbeat packets are non-TCP packets that use Ethertype values 0x8890, 0x8891, and 0x8890. The FGCP uses link-local IPv4 addresses in the 169.254.0.x range for HA heartbeat interface IP addresses.

To enable promiscuous mode in VMware:

  1. In the vSphere client, select your VMware server in the left pane and then select the Configuration tab in the right pane.
  2. In Hardware, select Networking.
  3. Select Properties of a virtual switch used to connect heartbeat interfaces.
  4. In the Properties window left pane, select vSwitch and then select Edit.
  5. Select the Security tab, set Promiscuous Mode to Accept, then select OK.
  6. Select Close.

You must also set the virtual switches connected to other FortiGate interfaces to allow MAC address changes and to accept forged transmits. This is required because the FGCP sets virtual MAC addresses for all FortiGate interfaces and the same interfaces on the different VM instances in the cluster will have the same virtual MAC addresses.

To make the required changes in VMware:

  1. In the vSphere client, select your VMware server in the left pane and then select the Configuration tab in the right pane.
  2. In Hardware, select Networking.
  3. Select Properties of a virtual switch used to connect FortiGate VM interfaces.
  4. Set MAC Address ChangestoAccept.
  5. Set Forged Transmits to Accept.

Power on your FortiGate VM

You can now proceed to power on your FortiGate VM. There are several ways to do this:

  • Select the name of the FortiGate VM you deployed in the inventory list and select Power on the virtual machine in the Getting Started
  • In the inventory list, right-click the name of the FortiGate VM you deployed, and select Power > Power On. l Select the name of the FortiGate VM you deployed in the inventory list. Click the Power On button on the toolbar.

Select the Console tab to view the console. To enter text, you must click in the console pane. The mouse is then captured and cannot leave the console screen. As the FortiGate console is text-only, no mouse pointer is visible. To release the mouse, press Ctrl-Alt.


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

FortiGate VM Transparent Mode VMware Configuration

Transparent mode VMware configuration

If you want to use your FortiGate-VM in transparent mode, your VMware server’s virtual switches must operate in promiscuous mode. This permits these interfaces to receive traffic that will pass through the FortiGate unit but was not addressed to the FortiGate unit.

In VMware, promiscuous mode must be explicitly enabled:

  1. In the vSphere client, select your VMware server in the left pane and then select the Configuration tab in the right pane.
  2. In Hardware, select Networking.
  3. Select Properties of vSwitch0.
  4. In the Properties window left pane, select vSwitch and then select Edit.
  5. Select the Security tab, set Promiscuous Mode to Accept, then select OK.
  6. Select Close.
  7. Repeat steps 3 through 6 for other vSwitches that your transparent mode FortiGate-VM uses.

 

High Availability VMware configuration                                                                           Power on your FortiGate VM


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

FortiGate VM Deployment example – VMware

Deployment example – VMware

Once you have downloaded the FGT_VMxx-v5-build0xxx-FORTINET.out.ovf.zip file from http://support.fortinet.com and extracted the package contents to a folder on your local computer, you can use the vSphere client to create the virtual machine from the deployment package OVF template.

The following topics are included in this section:

Open the FortiGate VM OVF file with the vSphere client

Configure FortiGate VM hardware settings

Open the FortiGate VM OVF file with the vSphere client

To deploy the FortiGate VM OVF template:

  1. Launch the VMware vSphere client, enter the IP address or host name of your server, enter your user name and password and select Login.

The vSphere client home page opens.

  1. Select File > Deploy OVF Template to launch the OVF Template wizard.

 

Open the                    OVF file with the vSphere client

Source page opens.

  1. Select the source location of the OVF file. Select Browse and locate the OVF file on your computer. Select Next to continue.

The OVF Template Details page opens.

  1. Verify the OVF template details. This page details the product name, download size, size on disk, and description. Select Next to continue.

End User License Agreement page opens.

  1. Read the end user license agreement for FortiGate VM. Select Accept and then select Next to continue.

Open the                    OVF file with the vSphere client

Name and Location page opens.

  1. Enter a name for this OVF template. The name can contain up to 80 characters and it must be unique within the inventory folder. Select Next to continue.

Disk Format page opens.

  1. Select one of the following:
  • Thick Provision Lazy Zeroed: Allocates the disk space statically (no other volumes can take the space), but does not write zeros to the blocks until the first write takes place to that block during runtime (which includes a full disk format).
  • Thick Provision Eager Zeroed: Allocates the disk space statically (no other volumes can take the space), and writes zeros to all the blocks.
  • Thin Provision: Allocates the disk space only when a write occurs to a block, but the total volume size is

reported by VMFS to the OS. Other volumes can take the remaining space. This allows you to float space between your servers, and expand your storage when your size monitoring indicates there is a problem. Note that once a Thin Provisioned block is allocated, it remains on the volume regardless if you have deleted data, etc.

  1. Select Next to continue.

The OVF Template Network Mapping page opens.

 

Configure                       hardware settings

  1. Map the networks used in this OVF template to networks in your inventory. Network 1 maps to port1 of the FortiGate VM. You must set the destination network for this entry to access the device console. Select Next to continue.

The OVF Template Ready to Complete page opens.

  1. Review the template configuration. Make sure that Power on after deployment is not enabled. You might need to configure the FortiGate VM hardware settings prior to powering on the FortiGate VM.
  2. Select Finish to deploy the OVF template. You will receive a Deployment Completed Successfully dialog box once the FortiGate VM OVF template wizard has finished.

Configure FortiGate VM hardware settings

Before powering on your FortiGate VM you must configure the virtual memory, virtual CPU, and virtual disk configuration to match your FortiGate VM license.

Configure FortiGate VM hardware settings

Configure                       hardware settings                                                   Transparent mode VMware configuration


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

FortiGate VM Overview

FortiGate VM Overview

The following topics are included in this section:

FortiGate VM models and licensing

Registering FortiGate VM with Customer Service & Support

Downloading the FortiGate VM deployment package

Deployment package contents

Deploying the FortiGate VM appliance

FortiGate VM models and licensing

Fortinet offers the FortiGate VM in five virtual appliance models determined by license. When configuring your FortiGate VM, be sure to configure hardware settings within the ranges outlined below. Contact your Fortinet Authorized Reseller for more information.

FortiGate VM model information

Technical Specification FG-VM00 FG-VM01 FG-VM02 FG-VM04 FG-VM08
Virtual CPUs (min / max) 1 / 1 1 / 1 1 / 2 1 / 4 1 / 8
Virtual Network

Interfaces (min / max)

2 / 10
Virtual Memory (min / max) 1GB / 1GB 1GB / 2GB 1GB / 4GB 1GB / 6GB 1GB /12GB
Virtual Storage (min / max) 32GB / 2TB
Managed Wireless APs (tunnel mode / global) 32 / 32 32 / 64 256 / 512 256 / 512 1024 / 4096
Virtual Domains (default / max) 1 / 1 10 / 10 10 / 25 10 / 50 10 / 250

After placing an order for FortiGate VM, a license registration code is sent to the email address used on the order form. Use the registration number provided to register the FortiGate VM with Customer Service & Support and then download the license file. Once the license file is uploaded to the FortiGate VM and validated, your FortiGate VM appliance is fully functional.

10

FortiGate VM Overview                                                    Registering FortiGate VM with Customer Service & Support

The number of Virtual Network Interfaces is not solely dependent on the FortiGate VM. Some virtual environments have their own limitations on the number of interfaces allowed. As an example, if you go to https://docs.microsoft.com/en-us/azure/virtualnetwork/virtual-networks-multiple-nics, you will find that Azure has its own restrictions for VMs, depending on the type of deployment or even the size of the VM.

FortiGate VM evaluation license

FortiGate VM includes a limited embedded 15-day trial license that supports: l 1 CPU maximum l 1024 MB memory maximum

l low encryption only (no HTTPS administrative access) l all features except FortiGuard updates

You cannot upgrade the firmware, doing so will lock the Web-based Manager until a license is uploaded. Technical support is not included. The trial period begins the first time you start FortiGate VM. After the trial license expires, functionality is disabled until you upload a license file.

Registering FortiGate VM with Customer Service & Support

To obtain the FortiGate VM license file you must first register your FortiGate VM with Customer Service & Support.

To register your FortiGate VM:

  1. Log in to the Customer Service & Support portal using an existing support account or select Sign Up to create a new account.
  2. In the main page, under Asset, select Register/Renew.

The Registration page opens.

  1. Enter the registration code that was emailed to you and select Register. A registration form will display.
  2. After completing the form, a registration acknowledgement page will appear.
  3. Select the License File Download
  4. You will be prompted to save the license file (.lic) to your local computer. See “Upload the license file” for instructions on uploading the license file to your FortiGate VM via the Web-based Manager.

Downloading the FortiGate VM deployment package

FortiGate VM deployment packages are included with FortiGate firmware images on the Customer Service & Support site. First, see the following table to determine the appropriate VM deployment package for your VM platform.

Downloading the FortiGate VM deployment package

Selecting the correct FortiGate VM deployment package for your VM platform

VM Platform FortiGate VM Deployment File
Citrix XenServer v5.6sp2, 6.0 and later FGT_VM64-v500-buildnnnn-FORTINET. out.CitrixXen.zip
OpenXen v3.4.3, 4.1 FGT_VM64-v500-buildnnnn-FORTINET.

out.OpenXen.zip

Microsoft Hyper-V Server 2008R2 and 2012 FGT_VM64-v500-buildnnnn-FORTINET. out.hyperv.zip
KVM (qemu 0.12.1) FGT_VM64-v500-buildnnnn-FORTINET.

out.kvm.zip

VMware ESX 4.0, 4.1

ESXi 4.0/4.1/5.0/5.1/5.5

FGT_VM32-v500-buildnnnn-FORTINET.

out.ovf.zip (32-bit)

FGT_VM64-v500-buildnnnn-FORTINET. out.ovf.zip

For more information see the FortiGate product datasheet available on the Fortinet web site, http://www.fortinet.com/products/fortigate/virtualappliances.html.

The firmware images FTP directory is organized by firmware version, major release, and patch release. The firmware images in the directories follow a specific naming convention and each firmware image is specific to the device model. For example, the FGT_VM32-v500-build0151-FORTINET.out.ovf.zip image found in the v5.0 Patch Release 2 directory is specific to the FortiGate VM 32-bit environment.

You can also download the FortiOS Release Notes, FORTINET-FORTIGATE MIB file, FSSO images, and SSL VPN client in this directory. The Fortinet Core MIB file is located in the main FortiGate v5.00 directory.

To download the FortiGate VM deployment package:

  1. In the main page of the Customer Service & Support site, select Download > Firmware Images.

The Firmware Images page opens.

  1. In the Firmware Images page, select FortiGate.
  2. Browse to the appropriate directory on the FTP site for the version that you would like to download.
  3. Download the appropriate .zip file for your VM server platform.

You can also download the FortiGate Release Notes.

  1. Extract the contents of the deployment package to a new file folder.

 

FortiGate VM Overview                                                                                            Deployment package contents

Deployment package contents

Citrix XenServer

The FORTINET.out.CitrixXen.zip file contains:

  • vhd: the FortiGate VM system hard disk in VHD format l fortios.xva: binary file containing virtual hardware configuration settings l in the ovf folder:
  • FortiGate-VM64.ovf: Open Virtualization Format (OVF) template file, containing virtual hardware settings for

Xen l fortios.vmdk: the FortiGate VM system hard disk in VMDK format l datadrive.vmdk: the FortiGate VM log disk in VMDK format

The ovf folder and its contents is an alternative method of installation to the .xva and VHD disk image.

OpenXEN

The FORTINET.out.OpenXen.zip file contains only fortios.qcow2, the FortiGate VM system hard disk in qcow2 format. You will need to manually:

l create a 32GB log disk l specify the virtual hardware settings

Microsoft Hyper-V

The FORTINET.out.hyperv.zip file contains:

  • in the Virtual Hard Disks folder:
  • vhd: the FortiGate VM system hard disk in VHD format l DATADRIVE.vhd: the FortiGate VM log disk in VHD format
  • In the Virtual Machines folder:
  • xml: XML file containing virtual hardware configuration settings for Hyper-V. This is compatible with Windows Server 2012.
  • Snapshots folder: optionally, Hyper-V stores snapshots of the FortiGate VM state here

KVM

The FORTINET.out.kvm.zip contains only fortios.qcow2, the FortiGate VM system hard disk in qcow2 format. You will need to manually:

l create a 32GB log disk l specify the virtual hardware settings

VMware ESX/ESXi

You will need to create a 32GB log disk.

Deploying the FortiGate VM appliance

The FORTINET.out.ovf.zip file contains:

  • vmdk: the FortiGate VM system hard disk in VMDK format l datadrive.vmdk: the FortiGate VM log disk in VMDK format l Open Virtualization Format (OVF) template files:
  • FortiGate-VM64.ovf: OVF template based on Intel e1000 NIC driver l FortiGate-VM64.hw04.ovf: OVF template file for older (v3.5) VMware ESX server l FortiGate-VMxx.hw07_vmxnet2.ovf: OVF template file for VMware vmxnet2 driver l FortiGate-VMxx.hw07_vmxnet3.ovf: OVF template file for VMware vmxnet3 driver

Deploying the FortiGate VM appliance

Prior to deploying the FortiGate VM appliance, the VM platform must be installed and configured so that it is ready to create virtual machines. The installation instructions for FortiGate VM assume that

  • You are familiar with the management software and terminology of your VM platform.
  • An Internet connection is available for FortiGate VM to contact FortiGuard to validate its license or, for closed environments, a FortiManager can be contacted to validate the FortiGate VM license. See “Validate the FortiGate VM license with FortiManager”.

For assistance in deploying FortiGate VM, refer to the deployment chapter in this guide that corresponds to your VMware environment. You might also need to refer to the documentation provided with your VM server. The deployment chapters are presented as examples because for any particular VM server there are multiple ways to create a virtual machine. There are command line tools, APIs, and even alternative graphical user interface tools.

Before you start your FortiGate VM appliance for the first time, you might need to adjust virtual disk sizes and networking settings. The first time you start FortiGate VM, you will have access only through the console window of your VM server environment. After you configure one FortiGate network interface with an IP address and administrative access, you can access the FortiGate VM web-based manager.

After deployment and license validation, you can upgrade your FortiGate VM appliance’s firmware by downloading either FGT_VM32-v500-buildnnnn-FORTINET.out (32-bit) or FGT_VM64-v500-buildnnnnFORTINET.out (64-bit) firmware. Firmware upgrading on a VM is very similar to upgrading firmware on a hardware FortiGate unit.


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

FortiExtender Modem Compatibility Matrix

FortiExtender Modem Compatibility Matrix

The following table lists the USB modems currently supported by FortiExtender.The list of supported modems below depends on the modem database version and not on the version of FortiOS. They are listed in alphabetical order. You can also find the list in the FortiOS web-based interface.

 

Note: FEX-100A has an internal modem, and therefore doesn’t support external USB modems.

 

To find the FortiExtender Modem list (FortiOS 5.4) – web-based manager:

1. Go to System > Feature Select and enable FortiExtender.

2. Go to Network > FortiExtender and select Configure Settings.

3. Under Modem Settings, select [Supported Modems].

4. Click the Update Now button to get the latest version of the Supported FortiGate Modems list.

5. Verify that the version number has updated, and select Supported FortiExtender Modems.

They are listed in alphabetical order.

 

Vendor Model Network
 

A-Link

 

3GU

 

3G

 

Alcatel

 

One Touch X020

 

3G

 

Alcatel

 

One Touch X030

 

3G

 

Alcatel

 

OT X220L

 

3G

 

Alcatel

 

OT-X080C

 

3G

 

Alcatel

 

OT-X220D

 

3G

 

Alcatel

 

X060S

 

3G

 

Alcatel

 

X200

 

3G

 

Alcatel

 

X215S

 

3G

 

Alcatel-Lucent

 

T930S

 

3G

 

Alcatel-sbell

 

ASB TL 131 TD-LTE

 

3G

 

AnyDATA

 

ADU-500A

 

3G

 

Vendor Model Network
 

AnyDATA

 

ADU-510A

 

3G

 

AnyDATA

 

ADU-510L

 

3G

 

AnyDATA

 

ADU-520A

 

3G

 

AnyDATA

 

APE-540H

 

3G

 

Axesstel

 

MU130

 

3G

 

BandLuxe

 

C120

 

3G

 

BandRich

 

BandLuxe C170

 

3G

 

BandRich

 

BandLuxe C270

 

3G

 

BandRich

 

BandLuxe C339

 

3G

 

Beceem

 

BCSM250

 

3G

 

C-motech

 

CDU-680

 

3G

 

C-motech

 

CDU-685a

 

3G

 

C-motech

 

CGU-628

 

3G

 

C-motech

 

CHU-628S

 

3G

 

C-motech

 

CHU-629S

 

3G

 

C-motech

 

D-50

 

3G

 

Celot

 

CT-680

 

3G

 

Celot

 

K-300

 

3G

 

Changhong

 

CH690

 

3G

 

China TeleCom

 

CBP7.0

 

3G

 

D-Link

 

DWM-156

 

3G

 

D-Link

 

DWM-162-US

 

3G

 

D-Link

 

DWR-510

 

3G

 

Digicom

 

8E4455

 

3G

 

EpiValley

 

SEC-7089

 

3G

 

 

Vendor Model Network
 

Exiss Mobile

 

E-190 series

 

3G

 

Franklin Wireless

 

CGU-628A

 

3G

 

Franklin Wireless

 

U210

 

3G

 

Franklin Wireless

 

U600

 

3G

 

GW

 

D301

 

3G

 

Haier

 

CE 100

 

3G

 

Haier

 

CE682 (EVDO)

 

3G

 

Huawei

 

E1550

 

3G

 

Huawei

 

E1612

 

3G

 

Huawei

 

E169

 

3G

 

Huawei

 

E1690

 

3G

 

Huawei

 

E1692

 

3G

 

Huawei

 

E171

 

3G

 

Huawei

 

E173

 

3G

 

Huawei

 

E1750

 

3G

 

Huawei

 

E1762

 

3G

 

Huawei

 

E177

 

3G

 

Huawei

 

E180

 

3G

 

Huawei

 

E1820

 

3G

 

Huawei

 

E270+

 

3G

 

Huawei

 

E3251

 

3G

 

Huawei

 

E3276s-151

 

3G

 

Huawei

 

E352

 

3G

 

Huawei

 

E353

 

3G

 

Huawei

 

E355s-1

 

3G

 

Vendor Model Network
 

Huawei

 

E535

 

3G

 

Huawei

 

E587

 

3G

 

Huawei

 

E630

 

3G

 

Huawei

 

EC156

 

3G

 

Huawei

 

EC168C

 

3G

 

Huawei

 

ET302

 

3G

 

Huawei

 

ET8282

 

3G

 

Huawei

 

GP02

 

3G

 

Huawei

 

K3765

 

3G

 

Huawei

 

K3770

 

3G

 

Huawei

 

K3771

 

3G

 

Huawei

 

K3772

 

3G

 

Huawei

 

K4305

 

3G

 

Huawei

 

K4505

 

3G

 

Huawei

 

K4605

 

3G

 

Huawei

 

R201

 

3G

 

Huawei

 

U7510

 

3G

 

Huawei

 

U7517

 

3G

 

Huawei

 

U8110

 

3G

 

Huawei

 

U8220

 

3G

 

Huawei

 

U8300

 

3G

 

I-O Data

 

WMX2-U Wimax

 

3G

 

JOA Telecom

 

LM-700r

 

3G

 

KDDI (Huawei)

 

HWD12 LTE

 

3G

 

Kyocera

 

W06K

 

3G

 

 

Vendor Model Network
 

LG

 

AD600

 

3G

 

LG

 

HDM-2100

 

3G

 

LG

 

L-02C LTE

 

3G

 

LG

 

L-03D

 

3G

 

LG

 

L-05A

 

3G

 

LG

 

L-07A

 

3G

 

LG

 

L-08C

 

3G

 

LG

 

LDU-1900D

 

3G

 

LG

 

LUU-2100TI (aka AT&T USBConnect

Turbo)

 

3G

 

LG

 

SD711

 

3G

 

Mediatek

 

MT6229

 

3G

 

MediaTek

 

MT6276M

 

3G

 

MediaTek

 

Wimax USB Card

 

3G

 

Micromax

 

MMX 300c

 

3G

 

MobiData

 

MBD-200HU

 

3G

 

Netgear

 

WNDA3200

 

3G

 

Netgear (Sierra Wireless)

 

AC313U

 

3G

 

Netgear (Sierra Wireless)

 

AC340U

 

3G

 

Netgear (Sierra Wireless)

 

AC341U

 

3G

 

Novatel

 

MC760 3G

 

3G

 

Novatel

 

MC990D

 

3G

 

Novatel

 

MC996D

 

3G

 

Novatel

 

U727

 

3G

 

Novatel

 

U760

 

3G

 

Novatel Wireless

 

MC545

 

3G

 

Vendor Model Network
 

Novatel Wireless

 

Merlin XU950D

 

3G

 

Novatel Wireless

 

Ovation 930D

 

3G

 

Novatel Wireless

 

Ovation MC950D HSUPA

 

3G

 

Novatel Wireless

 

Ovation USB551L

 

3G

 

Novatel Wireless

 

U679 Turbo Stick

 

3G

 

Olivetti

 

Olicard 100

 

3G

 

Olivetti

 

Olicard 145

 

3G

 

Onda

 

MT503HS

 

3G

 

Onda

 

MT505UP

 

3G

 

Onda

 

MT8205 LTE

 

3G

 

Onda

 

MW833UP

 

3G

 

Onda

 

MW836UP-K

 

3G

 

Onda

 

TM201

 

3G

 

Onda

 

WM301

 

3G

 

Option

 

Beemo

 

3G

 

Option

 

GI0643

 

3G

 

Option

 

Globetrotter

 

3G

 

Option

 

GlobeTrotter GI1515

 

3G

 

Option

 

iCon 461

 

3G

 

Option

 

iCon 711

 

3G

 

Pantech

 

P4200 LTE

 

3G

 

Pantech

 

UML290

 

3G

 

Pantech

 

UML295

 

3G

 

Pantech / UTStarcom

 

UMW190

 

3G

 

Samsung

 

GT-B1110

 

3G

 

 

Vendor Model Network
 

Samsung

 

GT-B3730

 

3G

 

Samsung

 

SGH-Z810

 

3G

 

Samsung

 

U209

 

3G

 

Sierra Wireless

 

313, 320U

 

3G

 

Sierra Wireless

 

AirCard 880U

 

3G

 

Sierra Wireless

 

AirCard 881U

 

3G

 

Sierra Wireless

 

Compass 597

 

3G

 

Solomon

 

S3Gm-660

 

3G

 

Sony Ericsson

 

MD300

 

3G

 

Sony Ericsson

 

MD400

 

3G

 

Sony Ericsson

 

MD400G

 

3G

 

SpeedUp

 

SU-8000U

 

3G

 

Toshiba

 

G450

 

3G

 

TP-Link

 

MA180

 

3G

 

TP-Link

 

MA260

 

3G

 

UTStarcom

 

UM175

 

3G

 

UTStarcom

 

UM185E

 

3G

 

ZTE

 

6535-Z

 

3G

 

ZTE

 

A371B

 

3G

 

ZTE

 

AC2710

 

3G

 

ZTE

 

AC2726

 

3G

 

ZTE

 

AC581

 

3G

 

ZTE

 

AC682

 

3G

 

ZTE

 

AC8710

 

3G

 

ZTE

 

AX226 WiMax

 

3G

 

Vendor Model Network
 

ZTE

 

K3520-Z

 

3G

 

ZTE

 

K3565

 

3G

 

ZTE

 

K3805-Z

 

3G

 

ZTE

 

MF100

 

3G

 

ZTE

 

MF110

 

3G

 

ZTE

 

MF112

 

3G

 

ZTE

 

MF190

 

3G

 

ZTE

 

MF190J

 

3G

 

ZTE

 

MF192

 

3G

 

ZTE

 

MF196

 

3G

 

ZTE

 

MF620

 

3G

 

ZTE

 

MF622

 

3G

 

ZTE

 

MF626

 

3G

 

ZTE

 

MF628

 

3G

 

ZTE

 

MF652

 

3G

 

ZTE

 

MF656A

 

3G

 

ZTE

 

MF668A

 

3G

 

ZTE

 

MF669

 

3G

 

ZTE

 

MF671

 

3G

 

ZTE

 

MF680

 

3G

 

ZTE

 

MF691 (T-Mobile Rocket 2.0)

 

3G

 

ZTE

 

MF820 4G LTE

 

3G

 

ZTE

 

MF821

 

3G

 

ZTE

 

MF821D

 

3G

 

ZTE

 

MU351

 

3G

 


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!

FortiGate Modem Compatibility Matrix

FortiGate Modem Compatibility Matrix

Vendor Model Network
 

AirPrime

 

5220

 

3G

 

Alcatel

 

HSPA Data Card

 

3G

 

Alcatel

 

x230M

 

3G

 

AnyDATA

 

ADY510L

 

3G

 

Audiovox

 

PC5740

 

3G

 

Vendor Model Network
 

Cmotech

 

CNU680

 

3G

 

D-Link

 

DWM-156

 

3G

 

D-Link

 

DWM-221

 

3G

 

Dell

 

5500

 

3G

 

Emobile

 

D11LC

 

3G

 

Emobile

 

ST Mobile

 

3G

 

Franklin

 

S600C

 

3G

 

Huawei

 

E126

 

3G

 

Huawei

 

E169

 

3G

 

Huawei

 

E1692/E303H

 

3G

 

Huawei

 

E173

 

3G

 

Huawei

 

E180/E220/E3735

 

3G

 

Huawei

 

E220/E3735

 

3G

 

Huawei

 

E353

 

3G

 

Huawei

 

E372

 

3G

 

Huawei

 

E392

 

3G

 

Huawei

 

E392/E397/E398

 

3G

 

Huawei

 

E392/E397/E353/E3276

 

3G

 

Huawei

 

E398

 

3G

 

Huawei

 

E600/E169

 

3G

 

Huawei

 

E3276

 

4G

 

Huawei

 

K3715

 

3G

 

Huawei

 

K3765

 

3G

 

Huawei

 

K3770

 

3G

 

Huawei

 

K3773

 

3G

 

Vendor

  Model Network
 

Huawei

 

K3773/E3131

 

3G

 

Huawei

 

K3806

 

3G

 

Huawei

 

K4201

 

4G

 

Huawei

 

K4505

 

3G

 

Huawei

 

K4511

 

3G

 

Kyocera

 

KPC650/Passport

 

3G

 

LG

 

L-02C

 

3G

 

LG

 

L-03D

 

3G

 

Maxon

 

USB3-8521

 

3G

 

MobiData

 

MBD-200HU

 

3G

 

NCXX Inc.

 

NCXX US302NC

 

3G

 

Novatel

 

ExpressCard34 Qualcomm 3G CDMA

 

3G

 

Novatel

 

MC679

 

3G

 

Novatel

 

MC990D

 

3G

 

Novatel

 

Merlin EX720

 

3G

 

Novatel

 

Merlin S620

 

3G

 

Novatel

 

Merlin S720

 

3G

 

Novatel

 

Merlin X950D

 

3G

 

Novatel

 

Merlin XU870

 

3G

 

Novatel

 

Ovation MC950D

 

3G

 

Novatel

 

Ovation MC998D

 

3G

 

Novatel

 

Ovation U720

 

3G

 

Novatel

 

Ovation U727

 

3G

 

Novatel

 

U760

 

3G

 

Novatel

 

U998

 

3G

 

Vendor Model Network
 

Option

 

GI1505

 

3G

 

Option

 

GI332

 

3G

 

Option

 

iCON 225 HSDPA

 

3G

 

Option

 

N.V. Globetrotter Fusion Quad Lite

 

3G

 

Option

 

N.V. Globetrotter HSDPA Modem

 

3G

 

Pantech

 

PX-500

 

3G

 

Pantech

 

UM190

 

3G

 

Pantech

 

UML290

 

3G

 

Quanta

 

MU-Q101

 

3G

 

Sierra

 

250U

 

3G

 

Sierra

 

597

 

3G

 

Sierra

 

598U

 

3G

 

Sierra

 

AC312U/AC503/USB306/USB308

 

3G

 

Sierra

 

AC313U

 

4G

 

Sierra

 

AC320U

 

3G

 

Sierra

 

AC330U

 

3G

 

Sierra

 

AC340U

 

3G

 

Sierra

 

AC501/880E

 

3G

 

Sierra

 

AirCard 580

 

3G

 

Sierra

 

AirCard 595

 

3G

 

Sierra

 

AirCard 595U

 

3G

 

Sierra

 

AirCard 875

 

3G

 

Sierra

 

C885

 

3G

 

Sierra

 

EM5625

 

3G

 

Sierra

 

MC5720

 

3G

 

Vendor Model Network
 

Sierra

 

MC5728

 

3G

 

Sierra

 

UC881

 

3G

 

Sprint

 

U300

 

3G

 

Teracom

 

LW273

 

3G

 

ZTE

 

AC2736

 

3G

 

ZTE

 

MF180

 

3G

 

ZTE

 

MF190

 

3G

 

ZTE

 

MF190U

 

3G

 

ZTE

 

MF626

 

3G

 

ZTE

 

MF637

 

3G

 

ZTE

 

MF668

 

3G

 

ZTE

 

MF680

 

3G

 

ZTE

 

MF683

 

3G

 

ZTE

 

MF691

 

3G

 

ZTE

 

MF820

 

3G

 

ZTE

 

MF821

 

3G

 

ZTE

 

MY39

 

3G


Having trouble configuring your Fortinet hardware or have some questions you need answered? Check Out The Fortinet Guru Youtube Channel! Want someone else to deal with it for you? Get some consulting from Fortinet GURU!