FortiManager supports network operations use cases for centralized management, best practices compliance, and workflow automation to provide better protection against breaches.


This article describes how to verify and troubleshoot FortiGuard connectivity on FortiManager.

Anti virus updates will be used as example.


Terminology used in this document:
FDS= AV/IPS service
FGD = WF/AS service
AV= Anti-Virus
IPS= Intrusion Prevention System
WF= Web-Filtering
AS= Anti-Spam

1) Ensure that FortiManager able to populate the product support coverages of the manage firewall.
Go to FortiGuard -> License Status.

2) Ensure that FortiGuard communication is enable.
AntiVirus and IPS Service needs to be 'ON' and FortiGate/FortiMail/FotiSandbox/FortiClient/FortiSwitch version has to be checked.
3) Verify that service access for FortiGate Updates (FDS) or Web Filtering (FGD) are enable on FortiManager management interface.
Manage unit will not able to get the update if it is not enable.

4) Check the FDS server list.
From CLI, use the command below:
# diagnose fmupdate view-serverlist fds

Note that (*) on means this is the current active FDS server.
FortiManager will use the next available server, if it fails to connect to

5) Verify the connectivity using packet sniffer.
# diagnose sniffer packet any “host <current fds server> and port 443”
6) Check the FDS connectivity log with the command below:
# diagnose fmupdate view-linkd-log fds
2020/10/13_20:46:14.608 info    fds_svrd[32057]: Start fds client session to '                :443', task = POLL svc=1
2020/10/13_20:46:15.509 info    fds_svrd[32057]: [FMG-->FDS] Request: Protocol=3.0|Command=Poll|Firmware=FMG-VM64-KVM-FW-6.04-2122|SerialNumber=FMG-VM0000000001|Persistent=false|AcceptDelta=0^M ^M
2020/10/13_20:46:16.580 info    fds_svrd[32057]: FCP_CONN:: receiving package: num_objects=3 total_size=1112
2020/10/13_20:46:16.580 info    fds_svrd[32057]: FCP_CONN:: received object: id=00000000FCPR00000 ver=00000.00000-2010130946 size=176
2020/10/13_20:46:16.580 info    fds_svrd[32057]: [FDS-->FMG] Response: Protocol=3.0|Response=200|Firmware=FPT033-FW-6.7-0121|SerialNumber=FPT-FCS-DELL0048|Server=FDSG|Persistent=false|ResponseItem=00000000FCNI00000:200*00000000FDNI00000:200^M ^M
2020/10/13_20:46:16.580 info    fds_svrd[32057]: FCP_CONN:: received object: id=00000000FCNI00000 ver=00000.00000-2001201850 size=88
2020/10/13_20:46:16.580 info    fds_svrd[32057]: FCP_CONN:: received object: id=00000000FDNI00000 ver=00000.00000-2008010807 size=464
2020/10/13_20:46:16.581 info    fds_svrd[32057]: Check update with fds                 SUCCESS
7)   Check the anti virus version and release date/time.
Compare with FortiGuard
8) Perform a manual update with the command below:
# diagnose fmupdate updatenow fds
7) Run the debug below if FDS update still fail.
# diagnose debug application fdssvrd 255
# diagnose debug enable