Description | This article describes an issue encountered where configuration changes fail to push to a managed FortiSwitch after changing the HTTPS port on the FortiSwitch. |
Scope | FortiSwitch version v7.2 v7.4 v7.6. |
Solution |
Basic Understanding:
Requirement: In some cases, security policies may require using non-standard ports for HTTPS (e.g., 4443 instead of 443).
Configuration Change: To change the HTTPS port, run the following command directly on a FortiSwitch to apply the configuration globally:
config system web
After this change, FortiSwitch management (internal/SVI/management) becomes accessible only on the new HTTPS port (for example: 4443).
Consequence:
Example FortiGate Command: Use the following command to review connection status:
Fortigate # execute switch-controller get-conn-status SWITCH-ID VERSION STATUS FLAG ADDRESS JOIN-TIME SERIAL
Flags: C=config sync, U=upgrading, S=staged, D=delayed reboot pending, E=config sync error, 2=L2, 3=L3, V=VXLAN, T=tunnel, X=External In debug logs on FortiGate, the sync error will be evident:
Debug command:
diagnose debug console timestamp enable
Example Error Message:
2024-11-12 16:00:33 396s:793ms:160us flcfg_remove_msw_sync_errors[1143]:No file /tmp/switch-controller/error-log/S248EFTF1XXXXXX to remove.
This error occurs because the manager, by default, uses port 443 (HTTPS) to push configurations to the managed FortiSwitch and cannot use a custom port (for example, port 4443), even if it is configured directly on the FortiSwitch.
Resolution:
config system web
For more information on the protocols used to manage FortiSwitch, refer to Management-Protocols-for-FortiSwitch-discovery. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.