Fortinet black logo
2.0.1

Recommendations and Special Notes

Recommendations and Special Notes

Recommendations

Fortinet recommends the following versions and configurations to use with FortiAIOps.

Product

Recommendation

FortiAP

  • FortiAP (FAP) version 7.2.2 and above is recommended to generate all events in FortiAIOps.
FortiOS
  • FortiOS version 7.2.4 and above or version 7.4.0 are recommended to generate all events in FortiAIOps.
FortiGate
  • [FortiGate/FortiAnalyzer] Configure the FortiAIOps IP address in the FortiGate syslog or FortiAnalyzer to send events to FortiAIOps.
  • Ensure that you enable the detection of interfering SSIDs in FortiGate to allow reporting of Throughput SLA - interference issues in FortiAIOps. To detect interfering SSIDs in FortiGate, configure the FortiAP profile to use Radio Resource Provisioning or a WIDS profile with AP scan enabled.
  • To receive SD-WAN logs, ensure that the SD-WAN monitoring license is applied in FortiGate. This is to generate congestion logs.
  • Configure the sla-fail and sla-pass log failure period, the recommended duration is 30 to 60 seconds.
  • When the backup file is restored on a different machine, reconfigure the FortiAIOps IP address in the FortiGate syslog settings.

Others

The FortiAIOps time and timezone should be synchronized with the NTP server.

Special Notes

Note the following when using FortiAIOps.

  • By default, there is no password for logging into the CLI mode for the first time. However, you are prompted to change the password after logging in. The default login credentials (username/password) for the GUI are admin/admin. Configuring the CLI password does not modify the GUI password.

  • The FortiAIOps CLI and GUI users are different.

  • Upgrading FortiAIOps is supported only via the CLI mode.

  • FortiAP and FortiSwitch events/logs are displayed randomly for both primary and secondary FortiGates in a cluster.

  • When a FortiGate is deleted and added in a new device group, the AI-Insights data is still displayed in the older device group.

  • This release supports the backup and restore function only for FortiAIOps configuration. CLI configurations are saved using the execute backup config command and it does not include any FortiAIOps specific configurations.

  • The import option is not available for FortiGates deployed in HA mode.

  • The Time to Connect - DNS delay is not supported.
  • SAM works with F-series FAPs, bridge mode SSIDs, and WPA2 PSK security mode only.

  • Currently only radio1 (2.4GHz) and radio 2 (5GHz) are supported for SAM operations.

  • SAM test results are not displayed in the baseline view details/trends page after the restore operation.

  • FortiAnalyzer version 7.4.1 is not supported due to an incorrect log format.

  • Time to Connect and Connection Failure SLA - WPA3 SAE and Enterprise modes are not supported.

  • The backup and restore operation is supported from version 2.0.0.

Recommendations and Special Notes

Recommendations

Fortinet recommends the following versions and configurations to use with FortiAIOps.

Product

Recommendation

FortiAP

  • FortiAP (FAP) version 7.2.2 and above is recommended to generate all events in FortiAIOps.
FortiOS
  • FortiOS version 7.2.4 and above or version 7.4.0 are recommended to generate all events in FortiAIOps.
FortiGate
  • [FortiGate/FortiAnalyzer] Configure the FortiAIOps IP address in the FortiGate syslog or FortiAnalyzer to send events to FortiAIOps.
  • Ensure that you enable the detection of interfering SSIDs in FortiGate to allow reporting of Throughput SLA - interference issues in FortiAIOps. To detect interfering SSIDs in FortiGate, configure the FortiAP profile to use Radio Resource Provisioning or a WIDS profile with AP scan enabled.
  • To receive SD-WAN logs, ensure that the SD-WAN monitoring license is applied in FortiGate. This is to generate congestion logs.
  • Configure the sla-fail and sla-pass log failure period, the recommended duration is 30 to 60 seconds.
  • When the backup file is restored on a different machine, reconfigure the FortiAIOps IP address in the FortiGate syslog settings.

Others

The FortiAIOps time and timezone should be synchronized with the NTP server.

Special Notes

Note the following when using FortiAIOps.

  • By default, there is no password for logging into the CLI mode for the first time. However, you are prompted to change the password after logging in. The default login credentials (username/password) for the GUI are admin/admin. Configuring the CLI password does not modify the GUI password.

  • The FortiAIOps CLI and GUI users are different.

  • Upgrading FortiAIOps is supported only via the CLI mode.

  • FortiAP and FortiSwitch events/logs are displayed randomly for both primary and secondary FortiGates in a cluster.

  • When a FortiGate is deleted and added in a new device group, the AI-Insights data is still displayed in the older device group.

  • This release supports the backup and restore function only for FortiAIOps configuration. CLI configurations are saved using the execute backup config command and it does not include any FortiAIOps specific configurations.

  • The import option is not available for FortiGates deployed in HA mode.

  • The Time to Connect - DNS delay is not supported.
  • SAM works with F-series FAPs, bridge mode SSIDs, and WPA2 PSK security mode only.

  • Currently only radio1 (2.4GHz) and radio 2 (5GHz) are supported for SAM operations.

  • SAM test results are not displayed in the baseline view details/trends page after the restore operation.

  • FortiAnalyzer version 7.4.1 is not supported due to an incorrect log format.

  • Time to Connect and Connection Failure SLA - WPA3 SAE and Enterprise modes are not supported.

  • The backup and restore operation is supported from version 2.0.0.