Supported Upgrade Paths For FortiOS 5.2.6
Supported Upgrade Paths For FortiOS 5.2.6
VERSION5.2.6
FORTINET DOCUMENTLIBRARY
http://docs.fortinet.com
FORTINETVIDEOGUIDE
http://video.fortinet.com
FORTINETBLOG
https://blog.fortinet.com
CUSTOMERSERVICE&SUPPORT
https://support.fortinet.com
http://cookbook.fortinet.com/how-to-work-with-fortinet-support/
FORTIGATECOOKBOOK
http://cookbook.fortinet.com
FORTINETTRAININGSERVICES
http://www.fortinet.com/training
FORTIGUARDCENTER
http://www.fortiguard.com
http://www.fortinet.com/doc/legal/EULA.pdf
FEEDBACK
Email: [email protected]
01-540-199976-20140917
TABLEOFCONTENTS
Change Log 4
Overview 5
Purpose of this Document 5
Scope of the Document 5
Location of Upgrade Path documents for other products 6
Product compatibility 6
Source Information 6
Divergence from the Release Notes 7
Using the Upgrade Steps Table 7
Release numbers 7
Build Numbers 8
Max Value Issue 8
Standalone vs. HA configuration upgrades 8
Parallel Development 8
Upgrade Methods 9
Upgrading from the Local Drive 9
Upgrading from the FortiGuard Network 9
UpgradeSteps Table 10
Potential Issues 18
Special Builds 18
Why read the Release Notes? 18
Sampling of upgrade issues 18
Failure of secondary WAN IP for admin access 18
Changing of Category Numbers 18
Web filter category removal and FortiManager 19
HA Virtual MAC Address Changes 19
Changing of Logging Settings 20
Familiar features removed or changed 20
Combination of variables that produce unexpected results 21
Downgrading issues 21
Generational incompatibility 21
Change Log
2016-03-15 Added Downgrading issues and Failure of secondary WAN IP for admin access
2015-12-04 Updated to include 5.2.5 and Divergence for Release Notes section
2015-11-03 HA cluster not properly upgrading from 5.0.10 and change to the upgrade paths to avoid 5.0.10
2015-09-14 change in the End of Support date for 4.3 and 5.0
2015-06-03 Added 2 new potential issue examples relating to Application Control and autoupdate override
2015-04-07 Added new potential issue example, updated link to Product Life Cycle page
2014-12-08 Updated to include 5.2.2, additional potential issue, location of other upgrade path documents.
Overview
The goal of this document is to make it easier for you to upgrade your FortiGate unit by guiding you to the most
likely intermediate firmware upgrades between your current version and the latest version of the firmware.The
latest version being the one with the highest patch number in this version branch.
Since multiple versions of firmware are often developed at the same time, there are different versions of the
upgrade path document, too. The title of the document will indicate which version of the firmware is the final
destination of the recommended upgrade path options. Be sure that you are looking at the proper document for
your objective. For instance, if your goal is to upgrade to the latest build of Version 5.0 looking at the Upgrade
Path document for 5.2 might give you some options that would appear confusing.
Every time you perform an upgrade to the firmware you should carefully read the release
notes of the firmware you are upgrading to. Release notes may include warnings or notices
of exceptions. The release notes can be found on the support site in the same directory as
the firmware. The Fortinet Support Site can be found at: https://support.fortinet.com.
For most devices these steps will show the path in steps from your current version to the latest Version, MR, and
patch. The steps shown by the Upgrade Steps Table are not the only possible path, but they are supported and
have been optimized to achieve the latest version of the firmware in the fewest steps.
Some older FortiGate hardware platforms do not have the resources to effectively use the
most recent firmware versions and so do not support firmware updates past a certain
version. To see if your device is affected by this check the Product Life Cycle page found at:
https://support.fortinet.com/Information/ProductLifeCycle.aspx
The scope of this document is limited to recommended upgrade practices for the FortiOS firmware, which is used
as the Operating System for the following products:
l FortiGate
l FortiWiFi
l FortiCarrier
This document does not include the upgrade paths for other Fortinet products such as:
l FortiManager
l FortiAnalyzer.
These products have their own upgrade path documentation.
l FortiAnalyzer
l FortiManager
These documents are available from the Fortinet Customer Service & Support Site, found at
https://support.fortinet.com, in the same directory as the firmware images and Release Notes.
l ftp://support.fortinet.com/FortiManager/v5.00/5.0/5.0.9/fortimanager-v5.0.9-upgrade-guide.pdf
l ftp://support.fortinet.com/FortiAnalyzer/v5.00/5.0/5.0.9/fortianalyzer-v5.0.9-upgrade-guide.pdf
The above links are examples only, as each firmware release for these products has its own document.
Product compatibility
This document does not include any references to release compatibility between Fortinet products. This is an
issue that administrators of environments where different Fortinet products are used should be aware of. For
instance, a specific version of FortiManager has a range of versions of FortiGate that it will be compatible with. If
the FortiGates are upgraded without verifying that the FortiManager will be compatible with them, a situation
could arise where the FortiManager will not be able to manage those newly upgraded FortiGates. On the other
side of the equation, it is also possible to upgrade a FortiManager beyond the compatibility range of some of the
older models of FortiGate.
If you have some older models of FortiGate that cannot be upgraded to current releases of firmware, and some
brand new models of FortiGate that cannot run older firmware, the situation can arise where a single
FortiManager will not be able to manage all of the FortiGates in the environment.This is an issue that the
administrator needs to be aware of when making decisions about which firmware to run.
The compatibility between models is listed in the Release Notes of the products. These should be read and the
environment should be planned out as a whole. It is possible that there is no one best option. The administrator
will have to weigh the pros and cons of all of the variables and keep in mind what the most important
requirements are for the environment.
Source Information
The initial source material for the development of the of the upgrade path table is the upgrade information
section found in the Release Notes that are written up for each new build of the FortiOS firmware.
Each time a firmware build comes out it is tested for compatibility with some of the previous builds in both the
current version and the version that preceded it. It is not, however necessarily tested with every single build in
these two versions. The two, sometimes 3, versions that are supported at the time of release are developed in
parallel and not in coordinated schedules so it is possible that the latest build in version 5 was developed long
after a lower numbered build in version 5.2. In short, the upgrade testing is done against build that are available
at the time of release. The upgrade steps may at times seem like they should be able to make larger jumps, but
we will only included upgrade steps that have been tested and proven to work in those tests.
The other reason that the Supported Upgrade Paths document can appear different from the Release Notes is
more in the form of a change in perspective. A Release Notes perspective is centered around the firmware
version it is describing, so it reaches back to see how many builds back can be successfully upgraded to that
version. The Upgrade Path document's perspective is taken from the device's current firmware version and
attempts to find an efficient path forward.
Release numbers
Over the life of the firmware, the designation of the individual releases has changed but this document tries to
make these designations as consistent and as easy to understand as possible.
Originally, the version designation was made up of a Version, possibly a major release within that version and
possible a patch number within that major release. If one was trying to refer to one of the later patches in a later
release of version 4 of the firmware it could be described as Version 4 MR 3 Patch 18.
To make writing the release name simpler a 'shorthand' developed using the pattern x.x.x. The numbers shown in
the table below are an abbreviated form of the firmware version names.
Recently, the longer version of describing the release was dropped in favor of the simplified format.So it is not
FortiOS Version 5 MR 2 Patch 1. It is simply FortiOS 5.2.1. Within the table, the simplified version is always used
when describing the path.
Build Numbers
In cases where there is no indication in the Web-based Manager what the version or build number is you can get
the build number from the CLI by entering the command:
get system status
The value in the output of the command for Branch point will be the build number.
There is a range of builds where the maximum number of some of the objects was lowered, but then a few builds
later was raised back up. If a configuration on a device was to have a number of these objects in excess of the
lower value when doing an upgrade there could be issues and even data loss so the upgrade paths listed are
designed to avoid upgrading into this lower max value range even though the Release Notes state that upgrading
to these firmware builds is supported. When the release notes were written the act of increasing the values was
not foreseen.
If you read the Release Notes for the firmware upgrades you will notice a discrepancy between what the Release
Notes say is possible for upgrades and what the Upgrade Steps Table shows.
In version 5 there is a difference in the steps between the patches depending on whether your FortiGate setup is
in a standalone or an HA configuration. If you have a standalone setup you can upgrade from Patch 3 (5.0.3)
directly to Patch 5 (5.0.5). However, if you are using an HA setup you need to add the intermediate step of going
to Patch 4 (5.0.4), otherwise only the slave unit in the configuration will be upgraded to Patch 5.
In the table describing the steps in progressing through the upgrades the most cautious path is listed. This
minimizes the possibility of confusion for somebody who has an HA cluster but reads the Release Notes, like
everybody should, but was unaware of the known issue with the HA clusters.
Parallel Development
Development of the firmware is usually taking place on two paths at the same time.There is development taking
place on the latest path, as well as the previous stable path. For instance if the latest path was 5.0.x then the
previous stable path that would still be in development would be 4.3.x. This has 2 significant ramifications as far
as upgrades are concerned. The first is that patches are still being built for each of these paths. The second is
that because this development is taking place in parallel the number identifiers for the builds do not correspond
directly with the sequence in which the builds come out.
Occasionally it will appear as if there are some odd jumps in the upgrade sequence. This has to do with the timing
of releases of different versions of the firmware. Later builds of different versions can come out close
togetherand so have a high likelihood ofcompatibility. This is why5.0.6 can only upgrade up to 5.0.9 but 4.3.18
can upgrade to 5.0.12
Upgrade Methods
There are two methods of primary methods of upgrading the firmware through the GUI; either from a local file
that has been previously downloaded or from the FortiGuard Network.
The file names are intended to be helpful in determining the correct firmware for the model you need. Here are
some of the conventions found in the file names.
l FGT_ = FortiGate
l FWF_ = FortiWiFi
l POE = Power over Ethernet
l VM32/VM64 = Virtual Machine versions of the firmware. The 32 and 64 referring to the bit architecture of the OS.
Firmware going directly on a Fortinet Device will have the .out extension.
Because of this limitation in options, it means that you will not be able to use the Upgrade from: FortiGuard
Network option to see all of the safe upgrade options. You will either have to use the included upgrade path table
or study the Release Notes.
For Upgrades:
UpgradeSteps Table
Starting
Build # Supported Steps to Latest Build of 5.2
Version
Starting
Build # Supported Steps to Latest Build of 5.2
Version
End of Support Date for Version 4.0 MR3 = March 19, 2017 (unless device supports FortiOS
version 5.0, then it's March 19, 2014)
4.0 MR3
688 5.0.12 5.2.6
patch17
4.0 MR3
672 4.3.18 5.0.12 5.2.6
patch15
4.0 MR3
664 4.3.18 5.0.12 5.2.6
patch13
4.0 MR3
646 4.3.18 5.0.12 5.2.6
patch11
4.0 MR3
637 4.3.11 4.3.18 5.0.12 5.2.6
patch9
4.0 MR3
535 4.3.11 4.3.18 5.0.12 5.2.6
patch7
4.0 MR3
513 4.3.11 4.3.18 5.0.12 5.2.6
patch5
4.0 MR3
496 4.3.11 4.3.18 5.0.12 5.2.6
patch3
Starting
Build # Supported Steps to Latest Build of 5.2
Version
4.0 MR3
458 4.3.11 4.3.18 5.0.12 5.2.6
patch1
4.0 MR2
353 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch14
4.0 MR2
346 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch12
4.0 MR2
338 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch10
4.0 MR2
328 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch8
4.0 MR2
320 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch6
4.0 MR2
313 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch4
4.0 MR2
291 4.2.13 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch2
Starting
Build # Supported Steps to Latest Build of 5.2
Version
End of Support Date for Version 4.0 MR1 = August 24, 2012
4.0 MR1
217 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch10
4.0 MR1
209 4.2.15 4.3.11 4.3.18 5.0.12 5.2.6
patch8
4.0 MR1
205 4.2.15 4.3.11 4.3.18 5.0.12 5.2.6
patch6
4.0 MR1
196 4.2.15 4.3.11 4.3.18 5.0.12 5.2.6
patch4
4.0 MR1
192 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch2
4.0
113 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch4
4.0
99 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch2
Starting
Build # Supported Steps to Latest Build of 5.2
Version
End of Support Date for Version 3.0 MR7 = July 18, 2011
3.0 MR7
754 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch10
3.0 MR7 753 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch9
3.0 MR7
752 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch8
3.0 MR7 750 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch7
3.0 MR7
744 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch6
3.0 MR7 741 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch5
3.0 MR7
740 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch4
3.0 MR7 737 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch3
3.0 MR7
733 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch2
3.0 MR7 730 4.0.0 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12
patch1
5.2.6
3.0 MR7 726 4.0.0 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12
5.2.6
3.0 MR6
678 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12 5.2.6
patch6
3.0 MR6 677 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch5
3.0 MR6
673 4.0.4 4.2.12 4.3.6 4.3.11 4.3.18 5.0.12 5.2.6
patch4
Starting
Build # Supported Steps to Latest Build of 5.2
Version
3.0 MR6 670 3.6.6 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12
patch3
5.2.6
3.0 MR6 668 3.6.6 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12
patch2
5.2.6
3.0 MR6 662 3.6.6 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12
patch1
5.2.6
3.0 MR6 660 3.6.6 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12
5.2.6
Starting
Build # Supported Steps to Latest Build of 5.2
Version
End of Support Date for Version 3.0 MR4 = December 29, 2009
3.0 MR4 483 3.6.6 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18 5.0.12
patch5
5.2.6
3.0 MR4 480 3.5.7 3.7.10 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18
patch4
5.0.12 5.2.6
3.0 MR4 479 3.5.7 3.7.10 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18
patch3
5.0.12 5.2.6
3.0 MR4 477 3.5.7 3.7.10 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18
patch2
5.0.12 5.2.6
3.0 MR4 475 3.5.7 3.7.10 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18
patch1
5.0.12 5.2.6
3.0 MR4 474 3.5.7 3.7.10 4.1.0 4.1.10 4.3.5 4.3.11 4.3.18
5.0.12 5.2.6
Starting
Build # Supported Steps to Latest Build of 5.2
Version
3.0 MR2 319 3.3.14 3.4.5 3.6.6 4.1.0 4.1.10 4.3.5 4.3.11
3.0 MR1 247 3.2.0 3.3.14 3.4.5 3.6.6 4.1.0 4.1.10 4.3.5
5.2.6
5.0.12 5.2.6
Potential Issues
Special Builds
Every now and then a "Special Build" is created for some specific purpose and some companies will put these into
production. These special builds are not part of the normal upgrade path QA process and therefore have a greater
risk of variance from what is normally expected in an upgrade. The table of the upgrade path is based on the
Release Notes of the regular builds and may not have included testing against every special build as well. If you
are running a special build, be even more cautious in upgrading than you would normally be.
Previously in this document, it was recommended that before upgrading from one version of the firmware to a
more recent one that the Release Notes be read. To give an indication of how important it is to read the Release
Notes we will provide a sampling of some of the possible issues that may have to be dealt with upon upgrading.
To offer some clarification on the contents of this sampling, some of these issues were and are unavoidable
because of the nature of the configurations of the FortiGate devices and the networks they were in. The reason
for reading the Release Notes is to make sure that users are prepared for changes or potential outages that may
occur so that the affected parties can be forewarned and the issues can be dealt with in a timely manner.
These are some issues, in no particular order, that have been brought to the attention of the Technical Assistance
Center or the Documentation Team that could result during the course of a firmware upgrade.
Packets are correctly sent to the second WAN IP address but the reply is sent through the other WAN interface.
Most instances will not be affected by this, but the upgrade path table has been modified to avoid 5.2.4 just to
avoid any possible impact.
larger or smaller it doesnt matter. If the list changes then so do the values of objects in that list. If your policies
are everything is wide open you are not likely to see an issue but if there are carefully crafted restrictions in place.
In stead of changing the subject of a category, there is an instance where a category was completely removed
from the list of categories. Firmware upgrades developed soon after the removal of the category sanitized the
configuration file. Later firmware versions ignored the category if it was left in the configuration file. An upgrade
from 4.3.18 to 5.0.12 may leave the category in place, but this does not effect the FortiGate. However, if
FortiManager, running a current version of its firmware, tries to work with a configuration file with the removed
category in it, an error message is triggered.
To determine if your FortiGate may effect the FortiGate later on, run this simple check.
To completely remove the chance of this effecting the FortiManager, use the following path when upgrading the
FortiGate:
There appears to be a large number of intermediate steps where the sanitizing of the
configuration file should be taking place. This is because references to the category
were not removed all at once. It first disappeared from the GUI and then from various
points within the CLI and the firmware code.
This path was not added to the main table as it is a somewhat isolated case.
The practical consequences of this could be seen in a situation where, in a very security conscious environment,
there is some blocking or allowed traffic based on mac addresses. When the firewalls mac address is not on the
list of allowed addresses any traffic going through the firewall is likely to be problematic.
Oddly enough, if the upgrade had gone all the way to 5.0.8, the issue would not have occurred.
While for some users the loss of this function may be inconsequential, to other users this function might be
useful. This is another reason to read the Release Notes; checking to verify that features commonly used in your
environment will be there after the upgrade.
This brings up an interesting situation regarding the Release Notes. The fact that this feature was, by default
disabled in 5.0 is mentioned in the Release Notes for 5.0. Because, the feature was still disabled between 5.0
and 5.2, although more strictly, it was not referred to the Release Notes for 5.2. If one is steadily upgrading the
firmware on devices as they come out and reading the Release Notes, the evolution can be seen and this is not
an issue. But making the jump from 4.3 to 5.2, and not reading the Release Notes of the intermediate firmware
builds can lead to finding a feature missing that was expected to be there, if you hapen to have one of the specific
models affected.
In order to prevent this from happening an upgrade to 5.0.7 needs to occur before the upgrade to 5.0.11. The
reason that this path is not part of the table, is that this situation refers to only 1 model and with a particular
configuration.
Example:Application Control
When upgrading from 5.0 to 5.2, there is a curious time delay on a side effect involving Application Control
profiles. If you have an Application Control profile that has some categories included, as well as some individual
Application Control signatures, and you upgrade from 5.0 to 5.2 everything will work as it did before. There is the
slight side effect that you will no longer see the individual signatures in the GUI, but the functionality will still be
there. The problem arises when the profile is actually edited. Editing the profile removes the individual
signatures. The only way to correct the error is to manually enter them in again.
Downgrading issues
While most potential issues occur during the upgrade process there are occasional ones that can occur when
downgrading firmware.
Generational incompatibility
Fortinet will sometimes produce different generations of the same model of device. Ideally, the firmware should
not be downgraded to a version earlier that what it came with from the factory.
Example:
The FortiGate 3600C generation 3 came with a new NPU DDR chip that the first and second generations of the
model did not have. The Support site has a firmware version 5.0.2 for the FortiGate 3600C.This would have been
for the first generation of the model but the third generation of the model will not properly run this version of the
firmware.