| Description |
This article describes the difference between Retrieve and Import actions, and why the latter sometimes requires to properly synchronizing changes made on the FortiGate with FortiManager. To explain the purpose of the Import, this article also describes the difference between a FortiGate Device-level database and the ADOM database, which is shared by all FortiGates in that ADOM. |
| Scope | FortiManager. |
| Solution |
To understand why Import is important, take a look at two types of databases in FortiManager:
The device DataBase (DB) includes the device level settings which are the settings that are displayed in Device Manager and are per each device. These include but are not limited to:
These include, but are not limited to:
Retrieve vs Import.
Retrieve: In the Device Manager, it is possible to double-click on the Firewall and go to Dashboard -> Configuration and installation widget -> total revisions -> retrieve config.
After the retrieval, the Config Status will be synchronized.
Import: To update these changes in Policy and Objects, it is necessary to import the configuration from the firewall. This can be done by 'right-clicking' on the firewall and selecting Import Configuration.
Then follow the wizard to import the policies and objects from the FortiGate.
Note: The import is done from the latest revision that is in Device Manager, so always make sure that the config status is green before importing.
The following commands can be used on the FortiManager CLI to debug the importing of policy & objects:
Troubleshooting: The following commands can be used on the FortiManager CLI to debug any issues during the retrieval or import of policies and objects:
diagnose debug reset diagnose debug application securityconsole 255 diagnose debug application depmanager 255 diagnose debug enable
Related articles: Technical Tip: Configuration import from the device to the ADOM DB/Policy & Objects |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.