Fortinet white logo
Fortinet white logo

FortiLink Guide

Whatʼs new in FortiOS 7.6.4

Whatʼs new in FortiOS 7.6.4

The following list contains new managed FortiSwitchOS features added in FortiOS 7.6.4. Click on a link to navigate to that section for further information:

  • You can now configure the maximum burst size allowed by storm control globally or per switch. For more details, see, Configuring storm control.

  • FortiOS now supports configuring the following features on layer-3 managed switches:

  • You can now use both FortiSwitch network access control (NAC) and 802.1X authentication on the same switch port. After a device is successfully authenticated with 802.1X authentication, the NAC user policy checks if the device is assigned to a specific user group. If the device matches the NAC user policy, it is assigned to a specific VLAN. For more details, see Using NAC with 802.1X authentication.

  • You can now log events that violate the IPv4 source-guard settings. The IPv4 source-guard violation log contains a maximum of 128 entries with a maximum of 5 entries per port, even if more violations have occurred. The IPv4 source-guard violation log applies to all FortiSwitch units in the virtual domain (VDOM). You can also specify how many seconds before source guard violations are removed from the log. For more details, see Checking the IPv4 source-guard violation log.

  • The maximum length for managed FortiSwitch names has changed from 16 characters to 35 characters. For more details, see Defining names for managed switches.

Whatʼs new in FortiOS 7.6.4

Whatʼs new in FortiOS 7.6.4

The following list contains new managed FortiSwitchOS features added in FortiOS 7.6.4. Click on a link to navigate to that section for further information:

  • You can now configure the maximum burst size allowed by storm control globally or per switch. For more details, see, Configuring storm control.

  • FortiOS now supports configuring the following features on layer-3 managed switches:

  • You can now use both FortiSwitch network access control (NAC) and 802.1X authentication on the same switch port. After a device is successfully authenticated with 802.1X authentication, the NAC user policy checks if the device is assigned to a specific user group. If the device matches the NAC user policy, it is assigned to a specific VLAN. For more details, see Using NAC with 802.1X authentication.

  • You can now log events that violate the IPv4 source-guard settings. The IPv4 source-guard violation log contains a maximum of 128 entries with a maximum of 5 entries per port, even if more violations have occurred. The IPv4 source-guard violation log applies to all FortiSwitch units in the virtual domain (VDOM). You can also specify how many seconds before source guard violations are removed from the log. For more details, see Checking the IPv4 source-guard violation log.

  • The maximum length for managed FortiSwitch names has changed from 16 characters to 35 characters. For more details, see Defining names for managed switches.