Description
This article describes how to configure FortiToken mobile push notifications.
Scope
FortiGate.
Solution
FortiGates with associated mobile FortiTokens can be configured to send push notifications: Instead of requiring users to submit the token code manually, it can simply confirm the login attempt on the same mobile their token is registered on.
Apple (APNS) and Google (GCM/FCM) provide the push service for iPhone and Android, respectively. This helps to avoid locking Tokens after disabling an already enabled two-factor authentication user.
FortiToken Mobile Push notifications can be configured via CLI only. If in multi-VDOM mode, ftm-push is configured in global VDOM.
FortiToken Mobile Push includes the following configurations depending on the version of FortiGate :
get system ftm-push
proxy : enable
interface :
server-port : 4433
server-cert : Fortinet_Factory
server-ip : 0.0.0.0
server :
status : disable
Note:
It is possible to configure one IP address at a time under 'server-ip' or 'server'.
Warning:
In FortiOS v6.4.10 up to FortiOS v7.4.0 inclusive, unset server-ip and use server configuration only. In these firmware versions, the 'set server-ip' setting is non-functional but still appears in configuration. Attempting to configure it will print the following error message.
config sys ftm-push
set server-ip X.X.X.X
Missing server address.
object check operator error, -56, discard the setting
Command fail. Return code -56
'set server-ip' is fully removed as of FortiOS v7.4.1.
In FortiOS v6.4.10 onwards, the 'set server' command is used. This setting provides the flexibility to use a domain name or an IP.
config sys ftm-push
set server site-a.example.com
end
Or:
config sys ftm-push
set server X.X.X.X
end
If the device has a dynamic public IP address:
config system ftm-push
set interface "wan1"
end
Configuring both 'set server' and 'set interface' is not supported, and if configured will print an error:
config sys ftm-push
set interface "wan1"
set server site-a.example.com
end
set either interface or server but not both.
attribute 'interface' set operator error, -651, roll back the setting
Command fail. Return code -651
Starting with v7.6.4, server IP/FQDN be configured through the GUI, see Technical Tip: Changing port for push notification configuration.
The push notification process runs as follows:
Requirements for FortiToken Mobile push to work properly.
config system interface
edit <name>
set allowaccess ftm ping
next
end
Note:
IKEv1 does not support FortiToken Mobile Push. If FortiToken Mobile Push is enabled globally on the FortiGate, FortiToken Mobile Users will not be able to login to IKEv1 dialup VPN.
Push notifications are supported for IPsec (IKEv2) starting from:
FortiClient versions:
More information on supported versions can be found in the article Technical Tip: Required firmware/software versions for using FortiToken Mobile or OTP MFA with Forti....
The IPSec dial-up connection with an IOS device will fail to connect if using the FortiToken MFA, as it will not receive the token push. As a workaround, include the token in the password field while connecting:
The user will enter p@ssw0rd345678 when prompted for the password.
Related documents:
Troubleshooting Tip: FTM-Push notification configured but not working
Technical Tip: How to provision FortiToken cloud
Technical Tip: FortiGate support for FTM push for firewall policy authentication
Technical Tip: FTM Push Notification failing with Error - 'Token denied or timeout (-7105)'
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.