Whatʼs new in FortiOS 7.6.4
The following list contains new managed FortiSwitchOS features added in FortiOS 7.6.4. Click on a link to navigate to that section for further information:
-
You can now configure the maximum burst size allowed by storm control globally or per switch. For more details, see, Configuring storm control.
-
FortiOS now supports configuring the following features on layer-3 managed switches:
-
Switched virtual interfaces (SVIs). For more details, see Switch virtual interfaces.
-
Routed virtual interfaces (RVIs). For more details, see Routed VLAN interfaces.
-
Static IPv4 routing. For more details, see Static IPv4 routing.
-
Virtual routing and forwarding (VRF). For more details, see Virtual routing and forwarding.
-
DHCP servers. For more details, see Configuring a DHCP server.
-
-
You can now use both FortiSwitch network access control (NAC) and 802.1X authentication on the same switch port. After a device is successfully authenticated with 802.1X authentication, the NAC user policy checks if the device is assigned to a specific user group. If the device matches the NAC user policy, it is assigned to a specific VLAN. For more details, see Using NAC with 802.1X authentication.
-
You can now log events that violate the IPv4 source-guard settings. The IPv4 source-guard violation log contains a maximum of 128 entries with a maximum of 5 entries per port, even if more violations have occurred. The IPv4 source-guard violation log applies to all FortiSwitch units in the virtual domain (VDOM). You can also specify how many seconds before source guard violations are removed from the log. For more details, see Checking the IPv4 source-guard violation log.
-
The maximum length for managed FortiSwitch names has changed from 16 characters to 35 characters. For more details, see Defining names for managed switches.