FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Matt_B
Staff
Staff
Article Id 348924
Description This article describes the process to disable the management tunnel between FortiGate and FortiGate Cloud.
Scope FortiGate Cloud, FortiGate v6.4 and later.
Solution

The management connection from individual FortiGate units to FortiGate Cloud can be disabled for troubleshooting purposes.

 

In previous FortiGate Cloud versions, it was possible to disable the management tunnel and continue sending logs to FortiGate Cloud while maintaining an earlier GA firmware release. 

Starting February 28 2025, a FortiGate without a FortiGate Cloud subscription must be running the latest GA patch release of its current firmware branch in order to access FortiGate Cloud services. FortiGate Cloud services including logging will be paused for devices running earlier patch releases, even if the management tunnel is disabled.

 

A notice regarding this change has been sent to customers. See this KB article Technical Tip: Security enforcement change for FortiGates provisioned to FortiGate Cloud without act... for more details.


Disabling the management tunnel can be done through the CLI:
Note this configuration also disables central management by FortiManager.

 

config system central-management

set type none

end


config system central-management

set type ?

fortimanager    FortiManager.

fortiguard      Central management of this FortiGate using FortiCloud.

none            No central management.

end

 

Effect of disabling central-management:

While the management tunnel is disabled in this way, FortiGate will show as offline in FortiGate Cloud, and it is no longer possible to monitor or manage the FortiGate remotely from the FortiGate Cloud portal.

 

FortiGate Cloud management disabled.PNG

 

Disabling the management tunnel should only be done with caution, as it disables the following FortiGate Cloud functions:

  • Remote administrator login to the FortiGate from FortiGate Cloud.
  • Firmware upgrade from FortiGate Cloud latest-patch notification
  • Automatic firmware upgrades using firmware profile.
  • Scheduled tasks and scripts.
  • Automatic configuration backups.
  • Remote monitoring of key firewall metrics such as memory and CPU use.
  • When the tunnel is disabled, 'Default-NOC-Fabric-Events', 'Default-NOC-System-Events', and other FortiGate Cloud event handlers that can alert administrators to a networking event may fail to run or may not act as expected.

 

FortiGate will still send logs to FortiGate Cloud as long as it is running the latest GA patch of its firmware release.

 

FortiGate cloud still shows events.PNG 

It is also possible to retrieve FortiGate Cloud logs to the FortiGate for local viewing.

 

retrieve log_modif.png

 

Automatic firmware upgrade:

From November 1 2024 until early Q1 2025, the 'latest patch' firmware profile was applied for all FortiGate devices without a FortiGate Cloud subscription running FortiOS v7.2 and earlier. If such FortiGate had a management tunnel to FortiGate Cloud and had no FortiGate Cloud subscription, it was subject to automatic patch-level using the 'latest patch' firmware profile.

 

After February 28 2025, enforcing latest patch firmware for devices accessing FortiGate Cloud services without a subscription is done by pausing access to these services while the FortiGate is not running the latest GA firmware release in its current branch. FortiGate Cloud will no longer perform automatic firmware upgrade for devices without a FortiGate Cloud subscription. (Devices with a FortiGate Cloud subscription will continue to their previous upgrade behavior according to the Firmware Profile assigned in FortiGate Cloud).

 

If the management tunnel to FortiGate Cloud is disabled, automatic firmware upgrade from the Firmware Profile assigned in FortiGate Cloud does not occur.


An automatic patch-level upgrade from FortiGuard is still attempted if 'set auto-firmware-upgrade enable' is configured in 'config system fortiguard'. Some platforms and/or firmware versions have this enabled by default. If needed, this firmware upgrade method can be disabled using the configuration below. See the article 'Automatic Patch Upgrades' for more information.


config system fortiguard

set auto-firmware-upgrade disable

end
Any pending automatic patch-level firmware upgrade has been removed.


config system fortiguard

set auto-firmware-upgrade ?
enable     Enable automatic patch-level firmware upgrade to latest version from FortiGuard.

disable    Disable automatic patch-level firmware upgrade to latest version from FortiGuard.

end

 

When an automatic patch-level upgrade occurs, the firewall upgrades to the latest GA release in its existing minor version. For example, a FortiGate running v7.2.7 would upgrade to the latest v7.2.x release following a recommended upgrade path. A FortiOS 'upgrade path' is a platform-specific series of firmware upgrades that may include multiple steps, see 'FortiGate/FortiOS recommended Upgrade Path' for more detail.

 

Verification:

On the FortiGate, the command 'diagnose test application forticldd 1' will show the management type as 'NONE' if remote management was disabled.

 

diagnose test application forticldd 1

System=FGT Platform=FGT61F

Connection vdom: root, id=0,  ha=primary.

acct_id=username@domain.com

acct_st=OK

 

FortiGuard interface selection: method=auto specify=FortiGuard log: status=enabled, full=overwrite, ssl_opt=1, source-ip=0.0.0.0

 

Centra Management: type=NONE, flags=000000bf.

 

active-tasks=0

 

rpdb_ver=00000002 rpdb6_ver=00000002

 

Disabling patch-level automatic upgrades is not a Best Practice for most deployments:

It is important to keep up-to-date on available firmware patches since they often contain important stability patches or vulnerability fixes. Disabling automatic firmware upgrades should only be done with a robust upgrade management plan in place and a full understanding of the risks of running unpatched firmware.

 

When the management tunnel is enabled, a High Availability cluster managed by FortiGate Cloud shows only the primary as Online:
The secondary device will always show offline even if the management tunnel is enabled in FortiGate Cloud. 

FortiGate HA cluster_2.PNG

 

In this scenario, the management tunnel to FortiGate Cloud has not yet been disabled even though the secondary device shows offline.

 

To disable the management tunnel for a High Availability cluster, the procedure is the same as the one described earlier in this article for a standalone FortiGate. This configuration is synced between devices:

 

config system central-management

set type none

end


Related articles:
How to control Automatic Upgrades/Firmware Profiles on FortiGate Cloud

FortiGate Cloud shows management tunnel down

How to send a notification from FortiGate Cloud Premium when FortiGate goes offline

 

Contributors