I have downloaded the FGT_VM64_SVM-v7.0.15.M-build0632-FORTINET.out.ovf from the Fortinet downloads portal
This appliance will be used with NSX integration.
I have deployed the OVF on the ESXi host. I accessed the Forti VM via url and have the serial number.
This is a trial license. I do not have a paid license here.
When I try to register the serial number on the Forti portal it returns an error
Please enter a valid registration number
I even tried registering the appliance from the UI portal however it did not work too.
Any suggestions here
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hello @lvaibhavt ,
Are your vm resources the same as the one mentioned on the license portal?
lvaibhavt is still having issues. Is that possible you have another look at his request please?
Thanks a lot in advance.
1. Make Sure correct Image is deployed, in many case we found where users deployed FFW Image instead of FGT
2. Resource allocation i.e CPU and RAM should be as per the evaluation license restrictions
3. Fortigate vm should have the Internet access and it should be able to resolve DNS queries .
run the command
di de app update -1
di de en
execute update-now
and share the output
If all above is correct, you can also register your device from the fortinet support portal and download the lic file from the portal
FortiGate-VMX-Servic~ger # get system status
Version: FortiGate-VMX-Service-Manager v7.2.8,build1639,240313 (GA.M)
Security Level: 1
Firmware Signature: certified
Virus-DB: 1.00000(2018-04-09 18:07)
Extended DB: 1.00000(2018-04-09 18:07)
Extreme DB: 1.00000(2018-04-09 18:07)
AV AI/ML Model: 0.00000(2001-01-01 00:00)
IPS-DB: 6.00741(2015-12-01 02:30)
IPS-ETDB: 6.00741(2015-12-01 02:30)
APP-DB: 6.00741(2015-12-01 02:30)
FMWP-DB: 0.00000(2001-01-01 00:00)
INDUSTRIAL-DB: 6.00741(2015-12-01 02:30)
IPS Malicious URL Database: 1.00001(2015-01-01 01:01)
IoT-Detect: 0.00000(2022-08-17 17:31)
Serial-Number: FGVMEVZRMEN-QW63
License Status: Invalid
VM Resources: 1 CPU, 2012 MB RAM
VMX License Status: 0/2 VMX deployed
Log hard disk: Available
Hostname: FortiGate-VMX-Service-Manager
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 2 in NAT mode, 0 in TP mode
Virtual domain configuration: multiple
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 1639
Release Version Information: GA
FortiOS x86-64: Yes
System time: Tue Jul 23 22:00:44 2024
Last reboot reason: warm reboot
FortiGate-VMX-Servic~ger #
FortiGate-VMX-Servic~ger # config global
FortiGate-VMX-Servic~ger (global) # di de app update -1
Debug messages will be on for 30 minutes.
FortiGate-VMX-Servic~ger (global) # di de en
FortiGate-VMX-Servic~ger (global) # execute update-now
FortiGate-VMX-Servic~ger (global) # upd_daemon[1980]-Received update request from pid=3530
upd_daemon[1800]-Found cached action=00000002
do_setup[347]-Starting SETUP
upd_fds_load_default_server6[1046]-Resolve and add fds usupdate.fortinet.net ipv6 address failed.
upd_comm_connect_fds[459]-Trying FDS 173.243.141.6:443
[115] __ssl_cert_ctx_load: Added cert /etc/cert/factory/root_Fortinet_Factory.cer, root ca Fortinet_CA, idx 0 (default)
[484] ssl_ctx_use_builtin_store: Loaded Fortinet Trusted Certs
[504] ssl_ctx_use_builtin_store: Enable CRL checking.
[511] ssl_ctx_use_builtin_store: Enable OCSP Stapling.
[814] ssl_ctx_create_new: SSL CTX is created
[841] ssl_new: SSL object is created
[194] ssl_add_ftgd_hostname_check: Add hostname checking 'usupdate.fortinet.net'
[346] __ssl_crl_verify_cb: CRL not found. Depth 0
__upd_peer_vfy[334]-Server certificate OK.
__upd_peer_vfy[334]-Server certificate OK.
__upd_peer_vfy[334]-Server certificate OK.
__upd_peer_vfy[334]-Server certificate OK.
[386] __bio_mem_dump: OCSP status good
pack_obj[185]-Packing obj=Protocol=3.0|Command=Setup|Firmware=FGVM6S-FW-7.02-1639|SerialNumber=FGVMEVZRMEN-QW63|Connection=Internet|Address=10.45.4.22:0|Language=en-US|TimeZone=-7|UpdateMethod=1|VMPlatform=VMWARE
get_fcpr_response[297]-Unpacked obj: Protocol=3.0|Response=202|Firmware=FPT033-FW-6.9-0209|SerialNumber=FPT-FGT-DELL0307|Server=FDSG|Persistent=false|PEER_IP=89.168.71.82
upd_vm_cfg_set_status[279]-Saved status code 202
upd_comm_disconnect_fds[500]-Disconnecting FDS 173.243.141.6:443
[206] __ssl_data_ctx_free: Done
[1094] ssl_free: Done
[198] __ssl_cert_ctx_free: Done
[1104] ssl_ctx_free: Done
[1085] ssl_disconnect: Shutdown
do_setup[357]-SETUP successful
upd_daemon[2203]-Disabling remaining actions 12
do_update[668]-Starting now UPDATE (final try)
__update_upd_comp_by_settings[490]-Disabling FLEN components.
__update_upd_comp_by_settings[494]-Disabling NIDSDB/ISDB/MUDB components.
__update_upd_comp_by_settings[498]-Disabling APPDB/IOTDB components.
__update_upd_comp_by_settings[502]-Disabling AVEN components.
__update_upd_comp_by_settings[506]-Disabling AVDB/FLDB/MMDB components.
upd_fds_load_default_server6[1046]-Resolve and add fds usupdate.fortinet.net ipv6 address failed.
upd_comm_connect_fds[459]-Trying FDS 173.243.141.6:443
[115] __ssl_cert_ctx_load: Added cert /etc/cert/factory/root_Fortinet_Factory.cer, root ca Fortinet_CA, idx 0 (default)
[484] ssl_ctx_use_builtin_store: Loaded Fortinet Trusted Certs
[504] ssl_ctx_use_builtin_store: Enable CRL checking.
[511] ssl_ctx_use_builtin_store: Enable OCSP Stapling.
[814] ssl_ctx_create_new: SSL CTX is created
[841] ssl_new: SSL object is created
[194] ssl_add_ftgd_hostname_check: Add hostname checking 'usupdate.fortinet.net'
[346] __ssl_crl_verify_cb: CRL not found. Depth 0
__upd_peer_vfy[334]-Server certificate OK.
__upd_peer_vfy[334]-Server certificate OK.
__upd_peer_vfy[334]-Server certificate OK.
__upd_peer_vfy[334]-Server certificate OK.
[386] __bio_mem_dump: OCSP status good
upd_pkg_create_update_req[681]-Update comp 0x1be64af0
upd_cfg_extract_antiphish_pattern_db_version[794]-Failed antiphish pattern db version, obj 31
pack_obj[185]-Packing obj=Protocol=3.2|Command=Update|Firmware=FGVM6S-FW-7.02-1639|SerialNumber=FGVMEVZRMEN-QW63|UpdateMethod=0|AcceptDelta=1|DataItem=07002000DBDB00100-00000.00000-0101010000*07002000CIDB00000-00001.00143-2403131645*07002000IPGO00000030411910162205*00000000FCNI00000-00000.00000-0000000000*00000000FDNI00000-00000.00000-0000000000*01000000FSCI00100-00000.00000-0000000000*07002000FFDB02008-00000.00000-0101010000*07002000UWDB00100-00000.00000-0101010000*07002000CRDB00000-00001.00045-2306281951*07002000SFAS00000-00000.00000-0101010000*07002000MCDB00100-00000.00000-0101010000*01000000ALCI00000-00000.00000-0000000000*07002000MADB00200-00001.00143-2212060900*07002000AFDB00100-00000.00000-0000000000*07002000ICDB00101-00000.00000-0101010000*07002000FMWP00105-00000.00000-0101010000
get_fcpr_response[297]-Unpacked obj: Protocol=3.2|Response=300|Firmware=FPT033-FW-6.9-0209|SerialNumber=FPT-FGT-DELL0302|Server=FDSG|Persistent=false|PEER_IP=89.168.71.82|ResponseItem=07002000DBDB00100:401*07002000CIDB00000:401*07002000IPGO00000:401*00000000FCNI00000:200*00000000FDNI00000:200*07002000FFDB02008:401*07002000UWDB00100:401*07002000CRDB00000:401*07002000SFAS00000:401*07002000MCDB00100:401*07002000MADB00200:401*07002000AFDB00100:401*07002000ICDB00101:401*07002000FMWP00105:401*01000000FSCI00100:200*01000000ALCI00000:401
doInstallUpdatePackage[1042]-Full obj found for FCNI000
doInstallUpdatePackage[1052]-Updating obj FCNI
installUpdateObject[289]-Step 1:Unpack obj 9, Total=1, cur=0
[591] ftnt_code_signing_verify_and_split:
[542] __ftnt_code_signing_verify:
[473] __parse_sig_data: Unrecognized digital signature.
installUpdateObject[321]-Signature verified for obj 9, ret=0, data_len=90, obj_len=90, sig_len=0.
installUpdateObject[358]-Step 2:Prepare temp file for obj 9
installUpdObjRest[799]-Step 3:Signal parent not to respawn
installUpdObjRest[809]-Step 4:Kill daemon(s)
installUpdObjRest[842]-Step 5:Backup /etc/fcni.dat->/tmp/update.backup
installUpdObjRest[870]-Step 6:Copy new object /tmp/upds2g9cx->/etc/fcni.dat
installUpdObjRest[955]-Step 7:Validate object
installUpdObjRest[979]-Step 8:Re-initialize using new obj file
upd_status_extract_support_info[627]-Support addr=support.fortinet.com/registration.aspx
installUpdObjRest[991]-Step 9:Delete backup /tmp/update.backup
installUpdObjRest[1028]-Step 10:Tell parent to respawn
doInstallUpdatePackage[1042]-Full obj found for FDNI000
doInstallUpdatePackage[1052]-Updating obj FDNI
installUpdateObject[289]-Step 1:Unpack obj 8, Total=1, cur=0
installUpdateObject[321]-Signature verified for obj 8, ret=0, data_len=2, obj_len=2, sig_len=0.
installUpdateObject[358]-Step 2:Prepare temp file for obj 8
installUpdObjRest[799]-Step 3:Signal parent not to respawn
installUpdObjRest[809]-Step 4:Kill daemon(s)
installUpdObjRest[979]-Step 8:Re-initialize using new obj file
installUpdObjRest[991]-Step 9:Delete backup /tmp/update.backup
installUpdObjRest[1028]-Step 10:Tell parent to respawn
doInstallUpdatePackage[1042]-Full obj found for FSCI000
doInstallUpdatePackage[1052]-Updating obj FSCI
installUpdateObject[289]-Step 1:Unpack obj 10, Total=1, cur=0
[591] ftnt_code_signing_verify_and_split:
[542] __ftnt_code_signing_verify:
[473] __parse_sig_data: Unrecognized digital signature.
installUpdateObject[321]-Signature verified for obj 10, ret=0, data_len=229, obj_len=229, sig_len=0.
installUpdateObject[358]-Step 2:Prepare temp file for obj 10
installUpdObjRest[799]-Step 3:Signal parent not to respawn
installUpdObjRest[809]-Step 4:Kill daemon(s)
installUpdObjRest[842]-Step 5:Backup /etc/sci.dat->/tmp/update.backup
installUpdObjRest[870]-Step 6:Copy new object /tmp/updpSyFNz->/etc/sci.dat
installUpdObjRest[955]-Step 7:Validate object
installUpdObjRest[979]-Step 8:Re-initialize using new obj file
upd_status_extract_contract_info[1255]-Extracting contract...(SerialNumber=FGVMEVZRMEN-QW63|Contract=AVDB-1-99-20240719:0:1:1:0*AVEN-1-99-20240719:0:1:1:0*NIDS-1-99-20240719:0:1:1:0|)
update_status_obj[740]-SBCL contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-AVDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-ETDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-EXDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-MMDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-FLDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-DBDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-AVAI contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-AVEN contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-NIDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-NIET contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-MUDB contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
update_status_obj[740]-NIEN contract expiry=Thu Jul 18 17:00:00 2024
level(99) alert(0)
upd_status_extract_contract_info[1255]-Extracting contract...(SupportLevelDesc=99:Trial)
upd_status_extract_contract_info[1255]-Extracting contract...(SupportTypeDesc=AVDB:Advanced Malware Protection*NIDS:FortiGuard IPS Service)
upd_status_extract_contract_info[1309]-pending registration(255) support acct() company() industry()
upd_status_extract_contract_info[1317]-valid contract percent=0%
upd_on_status_change[1162]-VM license number old:0, new:0
upd_on_status_change[1175]-VM vdom number old:0, new:0
installUpdObjRest[991]-Step 9:Delete backup /tmp/update.backup
installUpdObjRest[1028]-Step 10:Tell parent to respawn
upd_install_pkg[1453]-FCNI000(fcni) installed successfully
upd_install_pkg[1453]-FDNI000(fdslist) installed successfully
upd_install_pkg[1453]-FSCI000(contract) installed successfully
upd_install_pkg[1433]-FMWP001 is unauthorized
upd_install_pkg[1433]-CIDB000 is unauthorized
upd_install_pkg[1433]-IPGO000 is unauthorized
upd_install_pkg[1433]-FFDB020 is unauthorized
upd_install_pkg[1433]-UWDB001 is unauthorized
upd_install_pkg[1433]-CRDB000 is unauthorized
upd_install_pkg[1433]-DBDB001 is unauthorized
upd_install_pkg[1433]-SFAS000 is unauthorized
upd_install_pkg[1433]-MCDB001 is unauthorized
upd_install_pkg[1433]-ALCI000 is unauthorized
upd_install_pkg[1495]-This device is unauthorized, removing ALCI files.
upd_install_pkg[1433]-MADB002 is unauthorized
upd_install_pkg[1433]-AFDB001 is unauthorized
upd_install_pkg[1433]-ICDB001 is unauthorized
upd_status_save_status[135]-try to save on status file
upd_status_save_status[201]-Wrote status file
__upd_act_update[319]-Package installed successfully
upd_comm_disconnect_fds[500]-Disconnecting FDS 173.243.141.6:443
[206] __ssl_data_ctx_free: Done
[1094] ssl_free: Done
[198] __ssl_cert_ctx_free: Done
[1104] ssl_ctx_free: Done
[1085] ssl_disconnect: Shutdown
do_update[699]-UPDATE successful
I have downloaded this image https://postimg.cc/ykXhDLFf
Can you please point me to the exact documentation of this appliance
this is the appliance FortiGate-VMX-Service-Manager v7.2.8,build1639,240313 (GA.M)
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1558 | |
1033 | |
749 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.