M1 and M2 interfaces can use different VLANs for heartbeat traffic (408386)8
GTP load balancing8
FSSO user authentication is synchronized8
HA Link failure threshold changes (422264 )9
FortiGate-7000s running FortiOS v5.4.5 can be configured as dialup IPsec VPN servers 9
FortiGate-7000 overview11
Licenses, Device Registration, and Support11
FortiGate-7060E12
FortiGate-7060E front panel12
FortiGate-7060E schematic13
FortiGate-7040E14
FortiGate-7040E front panel14
FortiGate-7040E schematic15
FortiGate-7030E15
FortiGate-7030E front panel16
FortiGate-7030E schematic16
FIM-7901E interface module18
FIM-7901E schematic19
FIM-7904E interface module20
Splitting the FIM-7904E B1 to B8 interfaces21
FIM-7904E hardware schematic21
FIM-7910E interface module22
Splitting the FIM-7910E C1 to C4 interfaces23
FIM-7910E hardware schematic24
FIM-7920E interface module24
Changing the interface type and splitting the FIM-7920E C1 to C4 interfaces25
Splitting the C1 to C4 interfaces26
FIM-7920E hardware schematic26
FPM-7620E processing module27
NP6 network processors - offloading load balancing and network traffic28
Accelerated IPS, SSL VPN, and IPsec VPN (CP9 content processors)30
Getting started with FortiGate-700031
Managing individual modules32
Managing individual modules from the CLI33
Connecting to module CLIs using the management module33
Connecting to the FortiOS CLI of the FIM module in slot 134
Default VDOM configuration35
Default management VDOM35
Firmware upgrades35
Restarting the FortiGate-700035
Load balancing36
Traffic that cannot be load balanced36
Recommended configuration for traffic that cannot be load balanced37
Configuration synchronization39
Failover in a standalone FortiGate-700039
Replacing a failed FPMor FIMmodule39
Replacing a failed module in a standalone FortiGate-7000 chassis39
Replacing a failed module in a FortiGate-7000 chassis inan HAcluster40
Installing firmware on an FIM or FPM module from the BIOS using a TFTP server41
Uploading firmware from a TFTP server to an FIMmodule41
Uploading firmware from a TFTP server to an FPMmodule43
Operating a FortiGate-700045
Failover in a standalone FortiGate-700045
Replacing a failed FPMor FIMmodule45
Replacing a failed module in a standalone FortiGate-7000 chassis45
Replacing a failed module in a FortiGate-7000 chassis inan HAcluster46
Installing firmware on an FIM or FPM module from the BIOS using a TFTP server46
Uploading firmware from a TFTP server to an FIMmodule47
Uploading firmware from a TFTP server to an FPMmodule48
IPsec VPN51
Adding source and destination subnets to IPsec VPN phase 2 configurations51
Example basic IPsec VPN Phase 2 configuration51
Example multiple subnet IPsec VPN Phase 2 configuration52
Configuring the FortiGate-7000 as a dialup IPsec VPN server53
Example dialup IPsec VPN configuration53
Troubleshooting54
High Availability57
Before you begin configuring HA57
Connect the M1 and M2 interfaces for HA heartbeat communication58
HA configuration60
Setting up HA on the FIM interface modules in the first FortiGate-7000 (chassis 1)60
HA management configuration62
Managing individual modules in HAmode63
Firmware upgrade64
Session failover (session-pickup)64
Enabling session pickup for TCP and UDP65
If session pickup is disabled65
Primary unit selection and failover criteria66
Verifying primary chassis selection68
How link and module failures affect primary chassis selection68
FIM module failures70
Management link failures70
Link failure threshold and board failover tolerance70
Link failure threshold70
Board failover tolerance70
Priority and primary chassis selection71
Override and primary chassis selection71
FortiGate-7000 v5.4.5 special features and limitations72
Managing the FortiGate-700072
Default management VDOM72
Firewall72
IP Multicast72
HighAvailability73
Shelf Manager Module73
FortiOS features that are not supported by FortiGate-7000 v5.4.574
IPsec VPN tunnels terminated by the FortiGate-700074
SSL VPN75
Traffic shaping and DDoS policies75
Sniffer mode (one-arm sniffer)75
FortiGuard Web Filtering75
Log messages include a slot field75
FortiOS Carrier75
Special notice for new deployment connectivity testing75
FortiGate-7000 v5.4.3 special features and limitations77
Managing the FortiGate-700077
Default management VDOM77
Firewall77
Link monitoring and health checking77
IP Multicast78
HighAvailability78
Shelf Manager Module79
FortiOS features that are not supported by FortiGate-7000 v5.4.379
IPsec VPN tunnels terminated by the FortiGate-700079
More about IPsec VPN routing limitations80
SSL VPN80
Authentication80
Traffic shaping and DDoS policies81
Sniffer mode (one-arm sniffer)81
FortiGuard Web Filtering81
Log messages include a slot field81
FortiOS Carrier81
Special notice for new deployment connectivity testing81
December 20, 2017Updated for FortiGate-7000 v5.4.5. New sections include What's new in for
FortiGate-7000 v5.4.5 on page 8, FortiGate-7000 v5.4.5 special features and
limitations on page 72, IPsec VPN on page 51, gtp-load-balance {disable | enable} on
page 84, and Operating a FortiGate-7000 on page 45. Also, changes to High
Availability on page 57. New section Recommended configuration for traffic that
cannot be load balanced on page 37.Additional changes and fixes throughout the
document.
Changes to Installing firmware on an FIM or FPM module from the BIOS using a
November 7, 2017
November 2, 2017Updated with new information throughout the document including a new HA chapter.
TFTP server on page 41. Also added a note about the MGMT interface being a static
aggregate and not an LACP aggregate.
Change Log
August 30, 2017Updated with new information throughout the document.
December 1, 2016Initial Release
7FortiGate-7000
Fortinet Technologies Inc.
IntroductionWhat's new in for FortiGate-7000 v5.4.5
Introduction
This document describes what you need to know to get started using a FortiGate-7000 product. Also included are
details about CLI commands that are specific to FortiGate-7000 products.
This FortiOS Handbook chapter contains the following sections:
FortiGate-7000 overview provides a quick overview of FortiGate-7000 components.
Getting started with FortiGate-7000 describes how to get started with managing and configuring your FortiGate-
The following new features have been added to FortiGate-7000 v5.4.5.
M1 and M2 interfaces can use different VLANs for heartbeat traffic (408386)
The M1 and M2 interfaces can be configured to use different VLANs for HA heartbeat traffic.
The following command now configures the VLAN used by the M1 interface (default 999):
config system ha
set hbdev-vlan-id 999
end
The following new command configures the VLAN used by the M2 interface (default 1999):
config system ha
set hbdev-second-vlan-id 1999
end
GTP load balancing
GTP load balancing is supported for FortiGate-7000 configurations licensed for FortiOSCarrier. You can use the
following command to enable GTP load balancing. This command is only available after you have licensed the
FortiGate-7000 for FortiOSCarrier.
config load-balance setting
set gtp-load-balance enable
end
FSSO user authentication is synchronized
FSSO user authentication is synchronized to all FIM and FPMmodules. FSSO users are no longer required to reauthenticate when sessions are processed by a different FIM or FPM module.
FortiGate-7000
Fortinet Technologies Inc.
8
What's new in for FortiGate-7000 v5.4.5Introduction
HA Link failure threshold changes (422264 )
The link failure threshold is now determined based on the all FIM modules in a chassis. This means that the
chassis with the fewest active links will become the backup chassis.
FortiGate-7000s running FortiOS v5.4.5 can be configured as dialup IPsec VPN servers
The following shows how to setup a dialup IPsec VPN configuration where the FortiGate-7000 running v5.4.5 acts
as a dialup IPsec VPN server.
Configure the phase1, set type to dynamic.
config vpn ipsec phase1-interface
edit dialup-server
set type dynamic
set interface "v0020"
set peertype any
set psksecret <password>
end
Configure the phase 2, to support dialup IPsec VPN, set the destination subnet to 0.0.0.0 0.0.0.0.
config vpn ipsec phase2-interface
edit dialup-server
set phase1name dialup-server
set src-subnet 4.2.0.0 255.255.0.0
set dst-subnet 0.0.0.0 0.0.0.0
end
To configure the remote FortiGate as a dialup IPsec VPN client
The dialup IPsec VPN client should advertise its local subnet(s) using the phase 2 src-subnet option.
If there are multiple local subnets create a phase 2 for each one. Each phase 2 only
advertises one local subnet to the dialup IPsec VPN server. If more than one local
subnet is added to the phase 2, only the first one is advertised to the server.
Dialup client configuration:
config vpn ipsec phase1-interface
9FortiGate-7000
Fortinet Technologies Inc.
IntroductionWhat's new in for FortiGate-7000 v5.4.5
edit "to-fgt7k"
set interface "v0020"
set peertype any
set remote-gw 1.2.0.1
set psksecret <password>
end
config vpn ipsec phase2-interface
edit "to-fgt7k"
set phase1name "to-fgt7k"
set src-subnet 4.2.6.0 255.255.255.0
set dst-subnet 4.2.0.0 255.255.0.0
next
edit "to-fgt7k-2"
set phase1name "to-fgt7k"
set src-subnet 4.2.7.0 255.255.255.0
set dst-subnet 4.2.0.0 255.255.0.0
end
FortiGate-7000
Fortinet Technologies Inc.
10
Licenses, Device Registration, and SupportFortiGate-7000 overview
FortiGate-7000 overview
A FortiGate-7000 product consists of a FortiGate-7000 series chassis (for example, the FortiGate-7040E) with
FortiGate-7000 modules installed in the chassis slots. A FortiGate-7040E chassis comes with two interface
modules (FIM) to be installed in slots 1 and 2 to provide network connections and session-aware load balancing
to two processor modules (FPM) to be installed in slots 3 and 4.
FortiGate-7000 products are sold and licensed as packages that include the chassis as well as the modules to be
included in the chassis. When you receive your FortiGate-7000 series product the chassis has to be installed in a
rack and the modules installed in the chassis. Interface modules always go in slots 1 and 2 and processor
modules in slots 3 and up.
If your FortiGate-7000 product includes two different interfaces modules, for optimal configuration you should
install the module with the lower model number in slot 1 and the module with the higher model number in slot 2.
For example, if your chassis includes a FIM-7901E and a FIM-7904E, install the FIM-7901E in chassis slot 1 and
the FIM-7904E in chassis slot 2. This applies to any combination of two different interface modules.
As an administrator, when you browse to the FortiGate-7000 management IP address you log into the interface
module in slot 1 (the primary or master interface module or FIM) to view the status of the FortiGate-7000 and
make configuration changes. The FortiOS firmware running on each module has the same configuration and
when you make configuration changes to the primary interface module, the configuration changes are
synchronized to all modules.
The same FortiOS firmware build runs on each module in the chassis. You can upgrade FortiGate-7000 firmware
by logging into the primary interface module and performing a firmware upgrade as you would for any FortiGate.
During the upgrade process the firmware of all of the modules in the chassis upgrades in one step. Firmware
upgrades should be done during a quiet time because traffic will briefly be interrupted during the upgrade
process.
Licenses, Device Registration, and Support
A FortiGate-7000 product is made up of a FortiGate-7000 series chassis, one or two FIM interface modules and
two to four FPM processor modules. The entire package is licensed and configured as a single product under the
FortiGate-7000 chassis serial number. When you receive a new FortiGate-7000 product you register it on
https://support.fortinet.com using the chassis serial number. Use the chassis serial number when requesting
support from Fortinet for the product.
All Fortinet licensing, including FortiCare Support, IPS, AntiVirus, Web Filtering, Mobile Malware, FortiClient,
FortiCloud, and additional virtual domains (VDOM) is for the entire FortiGate-7000 product and not for individual
components.
If an individual component, such as a single interface or processor fails you can RMA and replace just that
component.
11FortiGate-7000
Fortinet Technologies Inc.
FortiGate-7060EFortiGate-7060E front panel
FortiGate-7060E
The FortiGate-7060E is a 8U 19-inch rackmount 6-slot chassis with a 80Gbps fabric and 1Gbps base backplane
designed by Fortinet. The fabric backplane provides network data communication and the base backplane
provides management and synch communication among the chassis slots.
FortiGate-7060E front panel
The chassis is managed by two redundant management modules. Each module includes an Ethernet connection
as well as two switchable console ports that provide console connections to the modules in the chassis slots. The
active management module controls chassis cooling and power management and provides an interface for
managing the modules installed in the chassis.
FortiGate-7060E front panel, (example module configuration)
FortiGate-7000
Fortinet Technologies Inc.
12
FortiGate-7060E schematicFortiGate-7060E
Power is provided to the chassis using four hot swappable 3+1 redundant 100-240 VAC, 50-60 Hz power supply
units (PSUs). You can also optionally add up to six PSUs to provide 3+3 redundancy. The FortiGate-7060E can
also be equipped with DC PSUs allowing you to connect the chassis to -48V DC power
The standard configuration of the FortiGate-7060E includes two FIM (interface) modules in chassis slots 1 and 2
and up to four FPM (processing) modules in chassis slots 3 to 6.
FortiGate-7060E schematic
The FortiGate-7060E chassis schematic below shows the communication channels between chassis components
including the management modules (MGMT), the FIM modules (called FIM1 and FIM2) and the FPM modules
(FPM3, FPM4, FPM5, and FPM6).
By default MGMT2 is the active management module and MGMT1 is inactive. The active management module
always has the IPMB address 0x20 and the inactive management module always has the IPMB address 0x22.
The active management module communicates with all modules in the chassis over the base backplane. Each
module, including the management modules has a Shelf Management Controller (SMC). These SMCs support
Intelligent Platform Management Bus (IPMB) communication between the active management module and the
FIM and FPM modules for storing and sharing sensor data that the management module uses to control chassis
cooling and power distribution. The base backplane also supports serial communications to allow console access
from the management module to all modules, and 1Gbps Ethernet communication for management and
heartbeat communication betweenmodules.
FIM1 and FIM2 (IPMB addresses 0x82 and 0x84) are the FIM modules in slots 1 and 2. The interfaces of these
modules connect the chassis to data networks and can be used for Ethernet management access to chassis
components. The FIM modules include DP2 processors that distribute sessions over the Integrated Switch Fabric
13FortiGate-7000
Fortinet Technologies Inc.
FortiGate-7060EFortiGate-7040E
(ISF) to the NP6 processors in the FPMmodules. Data sessions are communicated to the FPM modules over the
80Gbps chassis fabric backplane.
FPM03, FPM04, FPM05, and FPM06 (IPMB addresses 0x86, 0x88, 0x8A, and 0x8C) are the FPM processor
modules in slots 3 to 6. These worker modules process sessions distributed to them by the FIMmodules.
FPMmodules include NP6 processors to offload sessions from the FPM CPU and CP9 processors that accelerate
content processing.
FortiGate-7040E
The FortiGate-7040E is a 6U 19-inch rackmount 4-slot chassis with a 80Gbps fabric and 1Gbps base backplane
designed by Fortinet. The fabric backplane provides network data communication and the base backplane
provides management and synch communication among the chassis slots.
FortiGate-7040E front panel
The FortiGate-7040E chassis is managed by a single management module that includes an Ethernet connection
as well as two switchable console ports that provide console connections to the modules in the chassis slots. The
management module controls chassis cooling and power management and provides an interface for managing
the modules installed in the chassis. The standard configuration of the FortiGate-7040E includes two FIM
(interface) modules in chassis slots 1 and 2 and two FPM (processing) modules in chassis slots 3 and 4.
FortiGate-7040E front panel
FortiGate-7000
Fortinet Technologies Inc.
14
FortiGate-7030EFortiGate-7060E
FortiGate-7040E schematic
The FortiGate-7040E chassis schematic below shows the communication channels between chassis components
including the management module (MGMT), the FIM modules (called FIM1 and FIM2) and the FPM modules
(FPM3 and FPM4).
The management module (MGMT, with IPMB address 0x20) communicates with all modules in the chassis over
the base backplane. Each module, including the management module includes a Shelf Management Controller
(SMC). These SMCs support Intelligent Platform Management Bus (IPMB) communication between the
management module and the FIM and FPM modules for storing and sharing sensor data that the management
module uses to control chassis cooling and power distribution. The base backplane also supports serial
communications to allow console access from the management module to all modules, and 1Gbps Ethernet
communication for management and heartbeat communication betweenmodules.
FIM1 and FIM2 (IPMB addresses 0x82 and 0x84) are the FIM modules in slots 1 and 2. The interfaces of these
modules connect the chassis to data networks and can be used for Ethernet management access to chassis
components. The FIM modules include DP2 processors that distribute sessions over the Integrated Switch Fabric
(ISF) to the NP6 processors in the FPMmodules. Data sessions are communicated to the FPM modules over the
80Gbps chassis fabric backplane.
FPM3 and FPM4 (IPMB addresses 0x86 and 0x88) are the FPM processor modules in slots 3 and 4. These
worker modules process sessions distributed to them by the FIMmodules. FPMmodules include NP6 processors
to offload sessions from the FPM CPU and CP9 processors that accelerate content processing.
FortiGate-7030E
The FortiGate-7030E is a 6U 19-inch rackmount 3-slot chassis with a 80Gbps fabric and 1Gbps base backplane
designed by Fortinet. The fabric backplane provides network data communication and the base backplane
provides management and synch communication among the chassis slots.
15FortiGate-7000
Fortinet Technologies Inc.
FortiGate-7060EFortiGate-7030E
FortiGate-7030E front panel
The FortiGate-7030E chassis is managed by a single management module that includes an Ethernet connection
as well as two switchable console ports that provide console connections to the modules in the chassis slots. The
management module controls chassis cooling and power management and provides an interface for managing
the modules installed in the chassis. The standard configuration of the FortiGate-7030E includes one FIM
(interface) module in chassis slot 1 and two FPM (processing) modules in chassis slots 3 and 4. The front panel
also includes a sealed blank panel. Breaking the seal or removing the panel voids your FortiGate-7030E warranty.
FortiGate-7030E front panel (example module configuration)
(missing or bad snippet)
FortiGate-7030E schematic
The FortiGate-7030E chassis schematic below shows the communication channels between chassis components
including the management module (MGMT), the FIM module (called FIM1) and the FPM modules (FPM3 and
FPM4).
FortiGate-7000
Fortinet Technologies Inc.
16
FortiGate-7030EFortiGate-7060E
The management module (MGMT, with IPMB address 0x20) communicates with all modules in the chassis over
the base backplane. Each module, including the management module includes a Shelf Management Controller
(SMC). These SMCs support Intelligent Platform Management Bus (IPMB) communication between the
management module and the FIM and FPM modules for storing and sharing sensor data that the management
module uses to control chassis cooling and power distribution. The base backplane also supports serial
communications to allow console access from the management module to all modules, and 1Gbps Ethernet
communication for management and heartbeat communication betweenmodules.
FIM1 (IPMB address 0x82) is the FIM module in slot 1. The interfaces of this module connect the chassis to data
networks and can be used for Ethernet management access to chassis components. The FIM module include
DP2 processors that distribute sessions over the Integrated Switch Fabric (ISF) to the NP6 processors in the
FPMmodules. Data sessions are communicated to the FPM modules over the 80Gbps chassis fabric backplane.
FPM3 and FPM4 (IPMB addresses 0x86 and 0x88) are the FPM processor modules in slots 3 and 4. These
worker modules process sessions distributed to them by the FIMmodule. FPMmodules include NP6 processors
to offload sessions from the FPM CPU and CP9 processors that accelerate content processing.
17FortiGate-7000
Fortinet Technologies Inc.
FIM-7901E interface moduleFortiGate-7030E
FIM-7901E interface module
The FIM-7901E interface module is a hot swappable module that provides data, management and session
sync/heartbeat interfaces, base backplane switching and fabric backplane session-aware load balancing for a
FortiGate-7000 chassis. The FIM-7901E includes an integrated switch fabric and DP2 processors to load balance
millions of data sessions over the chassis fabric backplane to FPM processor modules.
The FIM-7901E can be installed in any FortiGate-7000 series chassis in hub/switch slots 1 and 2. The FIM-7901E
provides thirty-two 10GigE small form-factor pluggable plus (SPF+) interfaces for a FortiGate-7000 chassis.
You can also install FIM-7901Es in a second chassis and operate the chassis in HA mode with another set of
processor modules to provide chassis failover protection.
FIM-7901E front panel
The FIM-7901E includes the following hardware features:
l Thirty-two front panel 10GigE SFP+ fabric channel interfaces (A1 to A32). These interfaces are connected to
10Gbps networks to distribute sessions to the FPM processor modules installed in chassis slots 3 and up. These
interfaces can also be configured to operate as Gigabit Ethernet interfaces using SFP transceivers. These
interfaces also support creating link aggregation groups (LAGs) that can include interfaces from both FIM-7901Es.
l Two front panel 10GigE SFP+ interfaces (M1 and M2) that connect to the base backplane channel. These
interfaces are used for heartbeat, session sync, and management communication between FIM-7901Es in different
chassis. These interfaces can also be configured to operate as Gigabit Ethernet interfaces using SFP transceivers,
but should not normally be changed. If you use switches to connect these interfaces, the switch ports should be
able to accept packets with a maximum frame size of at least 1526. The M1 and M2 interfaces need to be on
different broadcast domains. If M1 and M2 are connected to the same switch, Q-in-Q must be enabled on the
switch.
l Four 10/100/1000BASE-T out of band management Ethernet interfaces (MGMT1 to MGMT4).
l One 80Gbps fabric backplane channel for traffic distribution with each FPM module installed in the same chassis as
the FIM-7901E.
l One 1Gbps base backplane channel for base backplane with each FPM module installed in the same chassis as the
FIM-7901E.
l One 40Gbps fabric backplane channel for fabric backplane communication with the other FIM-7901E in the chassis.
FortiGate-7000
Fortinet Technologies Inc.
18
FortiGate-7030EFIM-7901E interface module
l One 1Gbps base backplane channel for base backplane communication with the other FIM-7901E in the chassis.
l On-board DP2 processors and an integrated switch fabric to provide high-capacity session-aware load balancing.
l One front panel USB port.
l Power button.
l NMIswitch (for troubleshooting as recommended by Fortinet Support).
l Mounting hardware.
l LED status indicators.
FIM-7901E schematic
The FIM-7901E includes an integrated switch fabric (ISF) that connects the front panel interfaces to the DP2
session-aware load balancers and to the chassis backplanes. The ISFalso allows the DP2 processors to
distribute sessions amoung all NP6 processors on the FPMmodules in the same chassis.
FIM-7901E schematic
19FortiGate-7000
Fortinet Technologies Inc.
FIM-7904E interface moduleFortiGate-7030E
FIM-7904E interface module
The FIM-7904E interface module is a hot swappable module that provides data, management and session
sync/heartbeat interfaces, base backplane switching and fabric backplane session-aware load balancing for a
FortiGate-7000 series chassis. The FIM-7904E includes an integrated switch fabric and DP2 processors to load
balance millions of data sessions over the chassis fabric backplane to FPM processor modules.
The FIM-7904E can be installed in any FortiGate-7000 series chassis in hub/switch slots 1 and 2. The FIM-7904E
provides four Quad Small Form-factor Pluggable plus (QSFP+) interfaces for a FortiGate-7000 chassis. Using a
40GBASE-SR10 multimode QSFP+ transceiver, each QSFP+ interface can also be split into four 10GBASE-SR
interfaces.
You can also install FIM-7904Es in a second chassis and operate the chassis in HA mode with another set of
processor modules to provide chassis failover protection.
FIM-7904E front panel
The FIM-7904E includes the following hardware features:
l Eight front panel 40GigE QSFP+ fabric channel interfaces (B1 to B8). These interfaces are connected to 40Gbps
networks to distribute sessions to the FPM processor modules installed in chassis slots 3 and up. Using 40GBASESR10 multimode QSFP+ transceivers, each QSFP+ interface can also be split into four 10GBASE-SR interfaces.
These interfaces also support creating link aggregation groups (LAGs) that can include interfaces from both FIM7904Es.
l Two front panel 10GigE SFP+ interfaces (M1 and M2) that connect to the base backplane channel. These
interfaces are used for heartbeat, session sync, and management communication between FIM-7904Es in different
chassis. These interfaces can also be configured to operate as Gigabit Ethernet interfaces using SFP transceivers,
but should not normally be changed. If you use switches to connect these interfaces, the switch ports should be
able to accept packets with a maximum frame size of at least 1526. The M1 and M2 interfaces need to be on
different broadcast domains. If M1 and M2 are connected to the same switch, Q-in-Q must be enabled on the
switch.
l Four 10/100/10000BASE-T out of band management Ethernet interfaces (MGMT1 to MGMT4).
l One 80Gbps fabric backplane channel for traffic distribution with each FPM module installed in the same chassis as
the FIM-7904E.
FortiGate-7000
Fortinet Technologies Inc.
20
FortiGate-7030EFIM-7904E interface module
l One 1Gbps base backplane channel for base backplane with each FPM module installed in the same chassis as the
FIM-7904E.
l One 40Gbps fabric backplane channel for fabric backplane communication with the other FIM-7904E in the chassis.
l One 1Gbps base backplane channel for base backplane communication with the other FIM-7904E in the chassis.
l On-board DP2 processors and an integrated switch fabric to provide high-capacity session-aware load balancing.
l One front panel USB port.
l Power button.
l NMIswitch (for troubleshooting as recommended by Fortinet Support).
l Mounting hardware.
l LED status indicators.
Splitting the FIM-7904E B1 to B8 interfaces
Each 40GE interface (B1 to B8) on the FIM-7904Es in slot 1 and slot 2 of a FortiGate-7000 system can be split
into 4x10GBE interfaces. You split these interfaces after the FIM-7904Es are installed in your FortiGate-7000
system and the system us up and running. You can split the interfaces of the FIM-7904Es in slot 1 and slot 2 at
the same time by entering a single CLI command. Splitting the interfaces requires a system reboot so Fortinet
recommends that you split multiple interfaces at the same time according to your requirements to avoid traffic
disruption.
For example, to split the B1 interface of the FIM-7904E in slot 1 (this interface is named 1-B1) and the B1 and B4
interfaces of the FIM-7904E in slot 2 (these interfaces are named 2-B1 and 2-B4) connect to the CLI of your
FortiGate-7000 system using the management IP and enter the following command:
config system global
set split-port 1-B1 2-B1 2-B4
end
After you enter the command, the FortiGate-7000 reboots and when it comes up:
l The 1-B1 interface will no longer be available. Instead the 1-B1/1, 1-B1/2, 1-B1/3, and 1-B1/4 interfaces will be
available.
l The 2-B1 interface will no longer be available. Instead the 2-B1/1, 2-B1/2, 2-B1/3, and 2-B1/4 interfaces will be
available.
l The 2-B4 interface will no longer be available. Instead the 2-B4/1, 2-B4/2, 2-B4/3, and 2-B4/4 interfaces will be
available.
You can now connect breakout cables to these interfaces and configure traffic between them just like any other
FortiGate interface.
FIM-7904E hardware schematic
The FIM-7904E includes an integrated switch fabric (ISF) that connects the front panel interfaces to the DP2
session-aware load balancers and to the chassis backplanes. The ISFalso allows the DP2 processors to
distribute sessions amoung all NP6 processors on the FPMmodules in the same chassis.
The FIM-7910E interface module is a hot swappable module that provides data, management and session
sync/heartbeat interfaces, base backplane switching and fabric backplane session-aware load balancing for a
FortiGate-7000 series chassis. The FIM-7910E includes an integrated switch fabric and DP2 processors to load
balance millions of data sessions over the chassis fabric backplane to FPM processor modules.
The FIM-7910E can be installed in any FortiGate-7000 series chassis in hub/switch slots 1 and 2. The FIM-7910E
provides four C form-factor pluggable 2 (CFP2) interfaces for a FortiGate-7000 chassis. Using a 100GBASESR10 multimode CFP2 transceiver, each CFP2 interface can also be split into ten 10GBASE-SR interfaces.
The FIM-7910E includes the following hardware features:
l Four front panel 100GigE CFP2 fabric channel interfaces (C1 to C4). These interfaces are connected to 100Gbps
networks to distribute sessions to the FPM processor modules installed in chassis slots 3 and up. Using 100GBASESR10 multimode CFP2 transceivers, each CFP2 interface can also be split into ten 10GBASE-SR interfaces. These
interfaces also support creating link aggregation groups (LAGs) that can include interfaces from both FIM-7910Es.
l Two front panel 10GigE SFP+ interfaces (M1 and M2) that connect to the base backplane channel. These
interfaces are used for heartbeat, session sync, and management communication between FIM-7910Es in different
chassis. These interfaces can also be configured to operate as Gigabit Ethernet interfaces using SFP transceivers,
but should not normally be changed. If you use switches to connect these interfaces, the switch ports should be
able to accept packets with a maximum frame size of at least 1526. The M1 and M2 interfaces need to be on
different broadcast domains. If M1 and M2 are connected to the same switch, Q-in-Q must be enabled on the
switch.
l Four 10/100/1000BASE-T out of band management Ethernet interfaces (MGMT1 to MGMT4).
l One 80Gbps fabric backplane channel for traffic distribution with each FPM module installed in the same chassis as
the FIM-7910E.
l One 1Gbps base backplane channel for base backplane with each FPM module installed in the same chassis as the
FIM-7910E.
l One 40Gbps fabric backplane channel for fabric backplane communication with the other FIM-7910E in the chassis.
l One 1Gbps base backplane channel for base backplane communication with the other FIM-7910E in the chassis.
l On-board DP2 processors and an integrated switch fabric to provide high-capacity session-aware load balancing.
l One front panel USB port.
l Power button.
l NMIswitch (for troubleshooting as recommended by Fortinet Support).
l Mounting hardware.
l LED status indicators.
Splitting the FIM-7910E C1 to C4 interfaces
Each 100GE interface (C1 to C4) on the FIM-7910Es in slot 1 and slot 2 of a FortiGate-7000 system can be split
into 10 x 10GBE interfaces. You split these interfaces after the FIM-7910Es are installed in your FortiGate-7000
system and the system us up and running. You can split the interfaces of the FIM-7910Es in slot 1 and slot 2 at
the same time by entering a single CLI command. Splitting the interfaces requires a system reboot so Fortinet
recommends that you split multiple interfaces at the same time according to your requirements to avoid traffic
disruption.
For example, to split the C1 interface of the FIM-7910E in slot 1 (this interface is named 1-C1) and the C1 and C4
interfaces of the FIM-7910E in slot 2 (these interfaces are named 2-C1 and 2-C4) connect to the CLI of your
FortiGate-7000 system using the management IP and enter the following command:
config system global
set split-port 1-C1 2-C1 2-C4
end
After you enter the command, the FortiGate-7000 reboots and when it comes up:
l The 1-C1 interface will no longer be available. Instead the 1-C1/1, 1-C1/2, ..., and 1-C1/10 interfaces will be
available.
l The 2-C1 interface will no longer be available. Instead the 2-C1/1, 2-C1/2, ..., and 2-C1/10 interfaces will be
l The 2-C4 interface will no longer be available. Instead the 2-C4/1, 2-C4/2, ..., and 2-C4/10 interfaces will be
available.
You can now connect breakout cables to these interfaces and configure traffic between them just like any other
FortiGate interface.
FIM-7910E hardware schematic
The FIM-7910E includes an integrated switch fabric (ISF) that connects the front panel interfaces to the DP2
session-aware load balancers and to the chassis backplanes. The ISFalso allows the DP2 processors to
distribute sessions amoung all NP6 processors on the FPMmodules in the same chassis.
FIM-7910E hardware schematic
FIM-7920E interface module
The FIM-7920E interface module is a hot swappable module that provides data, management and session
sync/heartbeat interfaces, base backplane switching and fabric backplane session-aware load balancing for a
FortiGate-7000 series chassis. The FIM-7920E includes an integrated switch fabric and DP2 processors to load
balance millions of data sessions over the chassis fabric backplane to FPM processor modules.
The FIM-7920E can be installed in any FortiGate-7000 series chassis in hub/switch slots 1 or 2. The FIM-7920E
provides four Quad Small Form-factor Pluggable 28 (QSFP28) 100GigE interfaces for a FortiGate-7000 chassis.
Using a 100GBASE-SR4 QSFP28 or 40GBASE-SR4 QSFP+ transceiver, each QSFP28 interface can also be split
into four 10GBASE-SR interfaces.
You can also install FIM-7920Es in a second chassis and operate the chassis in HA mode with another set of
processor modules to provide chassis failover protection.
The FIM-7920E includes the following hardware features:
l Four front panel 100GigE QSFP28 fabric channel interfaces (C1 to C4). These interfaces are connected to
100Gbps networks to distribute sessions to the FPM processor modules installed in chassis slots 3 and up. Using a
100GBASE-SR4 QSFP28 or 40GBASE-SR4 QSFP+ transceiver, each QSFP28 interface can also be split into four
10GBASE-SR interfaces. These interfaces also support creating link aggregation groups (LAGs) that can include
interfaces from both FIM-7920Es.
l Two front panel 10GigE SFP+ interfaces (M1 and M2) that connect to the base backplane channel. These
interfaces are used for heartbeat, session sync, and management communication between FIM-7920Es in different
chassis. These interfaces can also be configured to operate as Gigabit Ethernet interfaces using SFP transceivers,
but should not normally be changed. If you use switches to connect these interfaces, the switch ports should be
able to accept packets with a maximum frame size of at least 1526. The M1 and M2 interfaces need to be on
different broadcast domains. If M1 and M2 are connected to the same switch, Q-in-Q must be enabled on the
switch.
l Four 10/100/1000BASE-T out of band management Ethernet interfaces (MGMT1 to MGMT4).
l One 80Gbps fabric backplane channel for traffic distribution with each FPM module installed in the same chassis as
the FIM-7920E.
l One 1Gbps base backplane channel for base backplane with each FPM module installed in the same chassis as the
FIM-7920E.
l One 40Gbps fabric backplane channel for fabric backplane communication with the other FIM-7920E in the chassis.
l One 1Gbps base backplane channel for base backplane communication with the other FIM-7920E in the chassis.
l On-board DP2 processors and an integrated switch fabric to provide high-capacity session-aware load balancing.
l One front panel USB port.
l Power button.
l NMIswitch (for troubleshooting as recommended by Fortinet Support).
l Mounting hardware.
l LED status indicators.
Changing the interface type and splitting the FIM-7920E C1 to C4 interfaces
By default, the FIM-7920E C1 to C4 interfaces are configured as 100GE QSFP28 interfaces. You can use the
following command to convert them to 40GE QSFP+ interfaces. Once converted, you can use the other
command below to split them into four 10GBASE-SR interfaces.
For example, to change the interface type of the C1 interface of the FIM-7920E in slot 1 to 40GE QSFP+ connect
to the CLI of your FortiGate-7000 system using the management IP and enter the following command:
config system global
set qsfp28-40g-port 1-C1
end
The FortiGate-7000 system reboots and when it starts up interface C1 of the FIM-7920E in slot 1 is operating as
a 40GE QSFP+ interface .
To change the interface type of the C3 and C4 ports of the FIM-7920E in slot 2 to 40GE QSFP+ enter the
following command:
config system global
set qsfp28-40g-port 2-C3 2-C4
end
The FortiGate-7000 system reboots and when it starts up interfaces C3 and C4 of the FIM-7920E in slot 2 are
operating as a 40GE QSFP+ interfaces.
Splitting the C1 to C4 interfaces
Each 40GE interface (C1 to C4) on the FIM-7920Es in slot 1 and slot 2 of a FortiGate-7000 system can be split
into 4 x 10GBE interfaces. You split these interfaces after the FIM-7920Es are installed in your FortiGate-7000
system and the system us up and running. You can split the interfaces of the FIM-7920Es in slot 1 and slot 2 at
the same time by entering a single CLI command. Splitting the interfaces requires a system reboot so Fortinet
recommends that you split multiple interfaces at the same time according to your requirements to avoid traffic
disruption.
For example, to split the C1 interface of the FIM-7920E in slot 1 (this interface is named 1-C1) and the C1 and C4
interfaces of the FIM-7920E in slot 2 (these interfaces are named 2-C1 and 2-C4) connect to the CLI of your
FortiGate-7000 system using the management IP and enter the following command:
config system global
set split-port 1-C1 2-C1 2-C4
end
After you enter the command, the FortiGate-7000 reboots and when it comes up:
l The 1-C1 interface will no longer be available. Instead the 1-C1/1, 1-C1/2, 1-C1/3, and 1-C1/4 interfaces will be
available.
l The 2-C1 interface will no longer be available. Instead the 2-C1/1, 2-C1/2, 2-C1/3, and 2-C1/4 interfaces will be
available.
l The 2-C4 interface will no longer be available. Instead the 2-C4/1, 2-C4/2, 2-C4/3, and 2-C4/4 interfaces will be
available.
You can now connect breakout cables to these interfaces and configure traffic between them just like any other
FortiGate interface.
FIM-7920E hardware schematic
The FIM-7920E includes an integrated switch fabric (ISF) that connects the front panel interfaces to the DP2
session-aware load balancers and to the chassis backplanes. The ISFalso allows the DP2 processors to
distribute sessions among all NP6 processors on the FPMmodules in the same chassis.
FIM-7920E hardware schematic
FPM-7620E processing module
The FPM-7620E processing module is a high-performance worker module that processes sessions load balanced
to it by FortiGate-7000 series interface (FIM) modules over the chassis fabric backplane. The FPM-7620E can be
installed in any FortiGate-7000 series chassis in slots 3 and up.
The FPM-7620E includes two 80Gbps connections to the chassis fabric backplane and two 1Gbps connections to
the base backplane. The FPM-7620E processes sessions using a dual CPU configuration, accelerates network
traffic processing with 4 NP6 processors and accelerates content processing with 8 CP9 processors. The NP6
network processors are connected by the FIM switch fabric so all supported traffic types can be fast path
accelerated by the NP6 processors.
The FPM-7620E includes the following hardware features:
l Two 80Gbps fabric backplane channels for load balanced sessions from the FIM modules installed in the chassis.
l Two 1Gbps base backplane channels for management, heartbeat and session sync communication.
l Dual CPUs for high performance operation.
l Four NP6 processors to offload network processing from the CPUs.
l Eight CP9 processors to offload content processing and SSL and IPsec encryption from the CPUs.
27FortiGate-7000
Fortinet Technologies Inc.
Loading...
+ 60 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.