FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
In the FortiOS firmware version 5.0, the Carrier features license activation process has changed, compared to the FortiOS version 4.00 MR3 or earlier versions.
The new process is as follows:
When a Carrier license is purchased, a "scratch card" license will be provided. - Each scratch card comes in an envelope named "FortiCarrier Upgrade Activation Code Certificate". - Each scratch card has a serial number (for example: FCRLIC471200xxxx); this serial number does not help to activate FortiOS Carrier features, and should not be used for that purpose.
To activate the Carrier feature license on your FortiGate unit: - Scratch each card in order to reveal the activation code; these are the digits that must be entered into the FortiGate unit management CLI. - The back of the scratch card includes instructions on how to type the activation code into the FortiGate management interface. - All activation codes are case sensitive.
Important notes: - After the activation code is entered, the modified FortiGate unit will reboot with a Factory-reset configuration, and will require an Internet connectivity to access the Fortinet license validation server to confirm the license.
- The activation process will fail if any of the following conditions are true: - The FortiGate does not have Internet access to FortiGuard. - The FortiGate is not connected to a FortiManager with access to Fortiguard. - The same activation license key cannot be used for 2 different FortiGate units. - Once activated, a license is assigned to a single FortiGate serial number; it is possible to change this assignment by contacting Fortinet Customer Service.
Successful and unsuccessful activation examples:
1. FortiGate unit is off-line (no internet access): Unsuccessful registration: license check cannot be done
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.