FortiAIOps 2.1.0 User Guide
FortiAIOps 2.1.0 User Guide
FortiAIOps 2.1.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: techdoc@fortinet.com
Change log 6
Overview 7
Getting Started 12
Installing FortiAIOps 13
Initial FortiAIOps Configuration 13
Licensing 14
Adding FortiGate 15
Enable Log Forwarding 15
Monitoring 16
System Diagnostics 17
API Reference 18
Deploying FortiAIOps on VM Platforms 19
Pre-installation Requirements 19
Installing FortiAIOps on VMware ESXi 19
Installing FortiAIOps on Hyper-V 21
Installing FortiAIOps on KVM 29
Installing FortiAIOps on Nutanix 31
Installing FortiAIOps on Proxmox 35
Post-installation Tasks 36
Accessing FortiAIOps 36
Upgrading FortiAIOps 37
Deploying FortiAIOps on Public Cloud Platforms 38
Microsoft Azure 38
Post-installation Tasks 46
Google Cloud Platform 46
Amazon Web Services (AWS) 53
Oracle Cloud Infrastructure (OCI) 58
Deploying FortiAIOps on Hardware Platforms 62
Deploying FortiAIOps 500G (FAO-500G) 62
Initial Configuration 62
Accessing the GUI 62
Command Line Interface (CLI) Reference 63
Dashboard 70
Summary 70
AI Insights 74
Summary 76
Impacted Clients Trend 76
Overall Network Health 77
Top 3 Impacted Apps 79
Top 5 Problematic Devices 79
Wireless 80
Change log
Overview
FortiAIOps enables you to proactively monitor the health of your entire wireless, wired, and SD-WAN network,
and provides insights into key health statistics, based on the Artificial Intelligence (AI) and Machine Learning
(ML) architecture that it is built upon. FortiAIOps ingests data for analysis and automated event correlation to
precisely detect anomalies that impact the clients’ network experience. It learns from numerous sources such
as FortiGates, FortiAPs, FortiSwitches, and FortiExtenders to report statistics on a series of comprehensive and
simple dashboards, providing visibility and deep insight into your network. This predictable network
infrastructure enables you to swiftly identify the root cause with the highest probability of association to actual
issues, and its resolution.
FortiAIOps is based upon a deployment-specific and adaptive learning AI/ML model, that automatically adjusts
whenever there are changes in the Radio Frequency (RF) environment. This is an enhancement from the static
AI/ML model of the previous releases. The system runs a weekly (on each Saturday) analysis, to detect any RF
changes based on the past week's collected data, and assess if accuracy improvements are possible. If
improvements are identified, the AI/ML model is updated to better align with your RF environment. All AI/ML
model changes are notified via a local log event message.
FortiAIOps monitors integrated wireless, wired, and SD-WAN networks by supporting the monitoring of
FortiGate controllers. You can monitor and manage FortiGate controllers concurrently associated with FortiAPs
and stations in a large deployments. The centralized real-time data and event logs offered by FortiAIOps, aim at
diagnosing and troubleshooting network issues by analyzing potential problems and suggesting remedial steps.
Wireless
Throughput
This SLA monitors your wireless network at the system and client level, to identify potential low throughput
conditions and categorize them based on the underlying issue type, into different classifiers and sub-classifiers.
Low throughput is determined based on specific network health parameters, such as, noise, retries, discards,
channel utilization etc. and client health parameters, such as, MCS index, data rate.
Coverage
Network coverage issues are monitored by detecting the coverage holes and overlapping FortiAPs (crowded
FortiAPs). These conditions in a network are determined by evaluating client’s RSSI (low signal strength) and
presence of multiple neighbouring FortiAPs.
Roaming
Wireless clients roam from one AP to another in a multi-AP deployment area swiftly and frequently. Associating
with different AP requires a process of re-authentication that can take some time to complete, impeding data
connectivity especially for time sensitive applications. The Roaming SLA identifies such slow roaming
connections, determines the causes for it and suggests suitable remedy for facilitating faster client roaming.
Time to Connect
This SLA computes the time taken by clients to connect to the network. FortiAIOps reports those clients that
take longer than certain thresholds to connect to the network. These thresholds are statically configured or
FortiAIOps computes them dynamically using machine learning algorithms. The algorithms compute specific
thresholds for the AP-client environment and for different connectivity phases such as association,
authentication (4-way handshake) and DHCP.
Connection Failure
This SLA determines the failed/unsuccessful client connections based on different stages of connection to a
network. For example, association failures due to low RSSI, authentication failures due to unreachable RADIUS
server, DHCP failure due to a DHCP server process crash, or DNS failure due to an invalid DNS domain.
This SLA determines the health of the FortiAPs based on the configured CPU, memory, temperature
thresholds, and events such as FortiAP reboot, FortiSwitch port down, FortiGate, and so on. FortiAIOps
displays relevant SLAs under different sections on the monitor dashboard.
Switching
The switching SLAs monitor the switch health and connection status.
l Throughput
l Network
l Switch Health and Uptime
l Switch Connection Failure
Throughput
The Throughput SLA monitors your wired network at the system and client level, to identify potential low
throughput conditions and categorizes them based on the underlying issue type, into different classifiers and
sub-classifiers. Low throughput is reported based on traffic congestion due to high inbound/outbound traffic,
storm conditions, low wired bandwidth conditions leading to network slowdowns, packet drops, and increased
latency.
Network
The Network SLA monitors the deployed FortiSwitches to predict any potential network disruptions that may
lead to poor connectivity. FortiAIOps detects such issues based on monitoring broadcast and multicast storms,
possible IP address exhaustion in the DHCP server, or MCLAG issues such as hardware mismatch or peer
communication glitches.
The Switch Health and Uptime SLA determines the health of the switches based on the configured thresholds
(CPU, memory, temperature) and events such as uplink and power budget issues, port flapping, port down,
switch down, and so on. FortiAIOps displays relevant SLAs under different sections on the AI Insight
dashboard and the Impacted SLA and Impacted Devices pages.
The Switch Connection Failure SLA determines the failed/unsuccessful client connections based on
authentication events such as MAC authentication and 802.1x authentication, MAC learning limit, and blocked
DHCP clients.
WAN
WAN is a software-defined approach for managing Wide-Area Networks (WAN). It allows you to offload internet
bound traffic, that is, private WAN services remain available for real-time and mission critical applications. This
added flexibility improves traffic flow and reduces pressure on the network. WAN has member interfaces and
ports that are used to run traffic.
l Performance
l FortiExtender
Performance
You can configure Performance SLAs to monitor member interface link quality and to detect link failures. The
link quality is measured based on latency, jitter, and packet loss. FortiAIOps WAN SLA can follow the
FortiExtender
FortiExtender integrates with FortiGate and WAN to become a part of Fortinet's security fabric. This integration
enables FortiGate’s WAN to have an extension using FortiExtender, providing continuous connectivity in case
FortiGate's primary WAN link fails. Also, FortiExtender enables network access for remote sites and branches
located beyond fixed broadband.
FortiExtender also facilitates load balancing for network traffic along with the primary WAN link. When
FortiExtender is a part of your network, FortiAIOps monitors and reports related issues/failures.
Note: FortiAIOps monitors only the FortiExtender devices managed by FortiGate.
Getting Started
This section is a tutorial to get you started with installing, setting up, and using the FortiAIOps application to
monitor your networks.
The steps depicted in this graphic are described in the following sections.
l Installing FortiAIOps
l Initial FortiAIOps Configuration
l Accessing FortiAIOps
l Licensing
l Adding FortiGate
l Enable Log Forwarding
l Configure SLA Metrics
l Monitoring
l API Reference
l System Diagnostics
Installing FortiAIOps
You can deploy FortiAIOps on supported VM, public cloud, and hardware platforms. Refer to the following
sections for detailed instructions on deployment procedures.
l VM Platforms - Deploying FortiAIOps on VM Platforms
l Public Cloud Platforms - Deploying FortiAIOps on Public Cloud Platforms
l Hardware Platforms - Deploying FortiAIOps on Hardware Platforms
Note: The FortiAIOps CLI and GUI users are different.
After FortiAIOps is successfully installed, login as an administrator with the default username (admin). A
password is not required. For more information on the commands, see Command Line Interface (CLI)
Reference.
l Configuring a Password
l Configuring the IP Address
l NTP/Timezone and DNS Configurations
l Viewing the Configuration
Configuring a Password
Login into the CLI with the username admin, a password is not required. However, after you login, you are
prompted to change the password.
The DHCP IP address is assigned by default. Run the get system interface command to view the IP
address. Run the config system interface command to configure a static IP address.
fortiaiops # config system interface
fortiaiops (interface) # edit port1
fortiaiops (port1) # set mode static
fortiaiops (port1) # set ip 10.34.159.xxx/xx
fortiaiops (port1) # end
You are required to configure the gateway IP address when using a static IP address. Run the config
router static command.
Fortinet recommends that you configure the NTP settings and DNS server. Run the following commands.
l config system ntp
l config system global [set timezone]
l config system dns
You can also configure the IP address , DNS, NTP, and the timezone via the GUI. See Settings.
Licensing
FortiAIOps offers Monitoring, AI Insights, and SD-WAN subscriptions, with licensing based on the type of
devices you use. For more information, see FortiAIOps Data Sheet.
Perform the following steps to obtain the license for FortiAIOps on VM platforms or public cloud platforms.
1. Copy System ID information: Navigate to Dashboard > Summary and copy the System ID.
2. Contract Registration: Login to https://support.fortinet.com using your account credentials to register the
contract received over email for the product SKU purchased. Paste the copied system id during the
registration process to generate the license file.
3. Download License file: Once the registration is complete, validate the entitlement details and download
the license file if generated successfully. Upload this file in System > FortiGuard > Upload License File.
For FortiAIOps 500G, manual license upload is not required. FortiAIOps automatically
synchronizes the license from Fortinet Support.
To initiate an immediate license and definition update, navigate to System >
FortiGuard and click the Update License and Definitions Now.
Note: Fortinet recommends that all network elements are fully licensed.
If the network elements are partially licensed, related statistics are not reported in FortiAIOps. For example, a
FortiAP is licensed and the connected FortiSwitch is not licensed; a FortiAP down event is triggered due to
FortiSwitch port down/FortiSwitch reboot. In this case, the FortiAP down event is reported in FortiAIOps but the
FortiSwitch port issues or reboot is not reported in FortiAIOps (as the FortiSwitch is not licensed). For more
information, see Licensing.
Ensure that the FortiAIOps NTP settings and your time zone are synchronized.
Adding FortiGate
In the FortiAIOps application portal, manually add the FortiGate controller. Navigate to Inventory > Managed
FortiGates > Add and provide the required configuration details. Standalone and HA FortiGate controllers can
be added. Optionally, you can add FortiGates in bulk using the import operation. For detailed information on
adding and managing FortiGate controllers, see Adding and Managing FortiGates.
You can group FortiGate controllers into Device Groups for ease of management. Each controller can belong
to only one group; if a controller is added to a second group, it is automatically removed from the previous
group. For detailed information on creating device groups, see Device Groups.
FortiAIOps supports direct FortiGate log forwarding and FortiAnalyzer log forwarding.
l Run the following command to configure syslog in FortiGate.
l config log syslogd setting
l set status enable
l set server 10.34.xxx.xxx
l Direct FortiGate log forwarding - Navigate to Fabric Connectors > Logging & Analytics > Log Settings
in the FortiGate GUI and specify the FortiAIOps IP address. Enable FortiAnalyzer log forwarding.
l Navigate to Log Forwarding in the FortiAnalyzer GUI, specify the FortiAIOps IP address and select the
FortiGate controller in Device Filters.
Monitoring
After the FortiAIOps setup and configurations are complete, you can view different aspects of your network in
the following panels of the FortiAIOps application portal.
AI Insights You can configure SLA metrics and the required thresholds, and monitor
the AI enabled data insights of your network and the impacted SLAs and
devices.
Inventory You can add FortiGate controllers and configure management operations.
Wireless The wireless section provides comprehensive data and statistics to monitor
wireless networks.
Switch The switch section provides comprehensive data and statistics to monitor
FortiSwitches and FortiSwitch clients.
Security Fabric The security fabric page represents the topology, that illustrates the logical
placement of the wireless service and the physical placement of hardware
devices.
Logs and Reports The logs section provides detailed WiFi and FortiSwitch event logs, you can
also generate detailed FortiAIOps reports.
System The system section includes several pages that offer valuable insights into
various aspects of system management, such as users, user groups,
backup and restore, settings, licensing, location services, and certificates.
Service Assurance The service assurance section provides an overview of the diagnostic and
trouble-prevention capability of FortiAIOps.
System Diagnostics
Access the FortiAIOps GUI and in top-right, click to download the diagnostics to aid in troubleshooting,
comprising of system, application, and FortiAIOps related logs. You can create the diagnostics file and
download it as required.
API Reference
FortiAIOps is Swagger compliant providing well documented APIs and improving their accessibility. You can
access API documentation using the URL, https://<FortiAIOps IP address>/swagger.
Deploying FortiAIOps is a simple process that involves downloading the installation files, performing the
installation, and completing post-installation steps. Here is an overview of the deployment process:
1. Ensure that the prerequisites are met before performing the installation.
2. Download installation files from the Fortinet Support portal.
3. Perform the installation.
l Installing FortiAIOps on VMware ESXi
l Installing FortiAIOps on Hyper-V
l Installing FortiAIOps on KVM
l Installing FortiAIOps on Nutanix
l Installing FortiAIOps on Proxmox on page 35
4. Complete the post-installation tasks.
Pre-installation Requirements
Ensure that the following requirements are met before proceeding with the installation.
Supported Environments
Hardware Requirements
The following table lists the minimum hardware requirements for deploying FortiAIOps.
Storage
CPU Memory
Disk 1 Disk 2
4 32 GB 8 GB 500 GB
Note: Disk 1 is used for OS and Disk 2 is used for data. You can extend or modify Disk 2 size based on your
requirements.
1. Download the installation file from Fortinet Support portal and unzip the file (FAO_VM64-vx.x.x-
devbuildxxxx-FORTINET.out.ovf.zip). This folder contains 4 installation files.
2. Connect and log in to the VMware ESXi host client with administrative rights.
3. Select Create/Register VM in the Host tab.
4. Select Deploy a virtual machine from an OVF or OVA file as the creation type.
5. Browse and select the downloaded installation files and enter a suitable hostname.
6. Select your preferred datastore to store the virtual machine files in the Select storage page.
7. Accept the end user license agreement.
8. In the Deployment options page:
a. Select you preferred VM network
b. Select your preferred disk provisioning method. Thin disk provisioning method is recommended.
c. Ensure Power on automatically option is selected
Note: To modify configurations, it is necessary to edit the VM configuration while the VM is in a
powered off state, and then start the VM.
10. You can monitor the progress of the deployment in the Recent Tasks pane. When the installation is
complete, the virtual machine will be listed in the Inventory pane.
11. Perform post-installation tasks.
6. Specify the memory that needs to be allocated. Click Next. See Pre-installation Requirements.
8. Select Use an existing virtual hard disk. Browse and select FAOWHV.vhd image locally stored. Click
Next.
11. Select IDE Controller 0 under Hardware in the left pane. Select Hard Drive and click Add.
12. Select the newly created hard drive. Select Virtual hard disk option. Browse and select the
DATADRIVE.vhd image. Click Ok.
13. Select Processor under Hardware in the left pane. Enter the number of virtual processors based on your
FortiAIOps configuration. Click Apply. Click Ok.
14. Right click on the virtual machine and click Start. Once the virtual machine is up and running, launch the
console.
15. Perform post-installation tasks.
3. Run the ./deploy_kvm {name of machine} {interface to run the machine} command to
deploy FortiAIOps in the virt-manager automatically.
5. Click Open to launch the console after the virtual machine is in a running state.
3. Upload both the FAOWHV.vhd and DATADRIVE.vhd files in the order as mentioned here. To upload
FAOWHV.vhd, click Upload Image and update the following fields.
6. Refresh the browser after a few seconds and the newly created images are listed in the Image
Configuration page.
7. To create a VM, navigate to the VM dashboard and click Create VM and enter the following configuration.
8. To create a new Boot disk, click Add New Disk and enter the following configuration.
l Select Clone from Image Service as the Operation and the disk is cloned from the FortiAIOps image
files uploaded earlier in this procedure.
l Select SCSI as the Bus Type.
9. Click Add.
10. Add another disk for DATADRIVE.vhd following the previous step.
Note: Ensure to create a new disk for FAOWHV.vhd first and then for DATADRIVE.vhd.
11. Add 4 Network Adapters, click Add New NIC.
13. Configure the FortiAIOps static IP address on starting the VM. See Post-installation Tasks.
Perform the following steps to deploy FortiAIOps on the Proxmox KVM platform.
1. Obtain FAO_VM64_KVM-v2.0.1-[build0xxx]-FORTINET.out.kvm.zip from Fortinet.
2. Use SCP to transfer this file to a Proxmox machine and extract it.
unzip FAO_VM64_KVM-v2.0.1-[build0xxx]-FORTINET.out.kvm.zip
-rwxrwxr-x 1 root root 3653632 May 9 12:06 OVMF_CODE_4M.secboot.fd
-rwxrwxr-x 1 root root 540672 May 9 12:06 Fimg_VARS.fd
-rw-r--r-- 1 root root 1394802688 May 9 12:20 FAOKVM.qcow2
-rwxr-xr-x 1 root root 1964 May 9 12:20 deploy_pmx
-rwxr-xr-x 1 root root 4112 May 9 12:20 deploy_kvm
-rw-r--r-- 1 root root 204608 May 9 12:20 datadrive.qcow2
-rw-r--r-- 1 root root 4521984 May 9 12:20 OVMF.qcow2
-rwxr-xr-x 1 root root 2749 May 9 12:20 KVM.xml.tmpl
-rw-r--r-- 1 root root 1358948555 May 9 16:48 FAO_VM64_KVM-v2.0.1-
[build0xxx]-FORTINET.out.kvm.zip
3. Import the FortiAIOps disk image manually in the Proxmox shell to create the VM.
./deploy_pmx -n <name> -v <volume> -b <bridge> [-i <vmid>] [-c <cores>] [-m
<memory>]
where
<name>is the name of the VM, for example, fortiaiops.
<volume> is the target storage ID, for example, local-lvm.
<bridge> is the network bridge to use, for example, vmbr0.
<vmid> is the ID assigned to the new VM; the default is to use the next available free ID.
<cores> is the number of CPU cores to allocate; the default is 8.
<memory> is the amount of RAM to allocate (in MB); the default is 32768 MB.
Post-installation Tasks
Accessing FortiAIOps
After successfully generating a new password and configuring a static IP address for the FortiAIOps server, you
can access the FortiAIOps application portal for management operations and to monitor your network. Open a
compatible web browser and enter the https://<fortiaiops_server_IP> URL, where <fortiaiops_server_IP> is the
configured static IP address. The default username/password is admin/admin; you are prompted to change the
password after the first login.
Upgrading FortiAIOps
You can upgrade FortiAIOps via the GUI and the CLI.
l Upgrade via GUI - Navigate to System > Upgrade to upgrade FortiAIOps. See Upgrade.
l Upgrade via CLI - Run the following command to upgrade FortiAIOps.
execute restore image ftp <path to upgrade file><upgrade file name> <IP
address> <username> <password>
Microsoft Azure
Perform the following steps to deploy FortiAIOps on Microsoft Azure. For more information on the Azure portal
configurations, see the Azure documentation.
1. Download the file FAO_VM64_AZURE-v2.0.1-[build0xxx]-FORTINET.out.azure.zip from Fortinet and
extract it to obtain the file FAO_VM64_AZURE-v2.0.1-[build0xxx]-FORTINETout.vhd.
2. Upload the extracted VHD file on to the Azure portal using the following procedure.
l Create a new Resource Group or use an existing one from the portal. See Manage Azure Resource
Group.
l Create a new Storage account or use an existing one from the portal. See Create a storage account.
l In the Storage account, select a Container or create a new one to upload the VHD file. See Create a
container.
l When uploading the VHD file, select the Blob type as Page blob.
l After the upload, verify that the file is listed in the Containers page.
3. Create a managed image from the uploaded VHD file. Navigate to Images > Create an image in the Azure
portal and configure the following settings.
l Select a Resource group.
l Enter a Name for the image.
l Select the applicable Region from the list.
l Set the OS type to Linux.
l Set the VM generation to Gen 1.
4. Browse and select the uploaded VHD file in the Storage blob.
Note: It is not required to add data disk in this step, the data disk addition is required when the virtual
machine is created.
5. Click Review + create to create an image.
6. Create a virtual machine from the managed image that you just created. Select Virtual machines >
Create Azure virtual machine on portal.
7. Click See all images to browse and select the image that was generated in the previous step.
8. Click See all sizes to select a virtual machine size.
Note: It is recommended to select VM size as 4 vCPU and 32 GB RAM, and the Local storage as 0.
9. Configure network inbound port rules to allow SSH access in the field Select inbound ports.
10. Click Next: Disks and configure disk data as is depicted in the following image.
Note: The recommended minimum data disk size is 128GB.
12. Select the available Virtual network and the Public IP of the deploying machine.
13. Review the configurations under the tabs, Management, Monitoring, and Advanced.
14. Click Next: Tags and add the required tags.
15. Click Next: Review + create and click Create only if the virtual machine validation is passed, as depicted
in the following image.
16. Connect the virtual machine in one for the following methods.
l Connect via Serial Console - Select the running virtual machine and then select Serial console in the
menu.
l Connect via SSH - Obtain the public IP address of the virtual machine and use SSH to connect to the
virtual machine.
ssh admin@<public_IP>
Post-installation Tasks
l The public IP address of the virtual machine is available in the Overview page of the virtual machine.
l Create the inbound port rules as depicted in the following image, in the Network settings of the virtual
machine, to enable all FortiAIOps functionality.
Note: Do not change the corresponding IP mode setting from the FortiAIOps GUI or CLI; modify all network
from the Azure portal only.
5. Run the ./google-cloud-sdk/install.sh script (from the root of the folder you extracted the file to).
6. Run ./google-cloud-sdk/bin/gcloud init to initialize GCP CLI.
7. Upload the file FAO_VM64_GCP-v2.0.1-[build0xxx]-FORTINET.out.gcp.tar.gz to the Cloud storage bucket
in the GCP CLI.
./google-cloud-sdk/bin/gsutil FAO_VM64_GCP-v2.0.1-[build0xxx]-
FORTINET.out.gcp.tar.gz gs://my-some-bucket
8. Run the following script to create a secure boot image.
# bash -x import2gcpimg.sh AIOPSBuild FAO_VM64_GCP-v2.0.1-devbuild0448-
FORTINET.out.gcp.tar.gz aiops-gcp.
where, IMAGE_NAME =[FortiAIOps build], SOURCE_FILE= [FortiAIOps image file name, and BUCKET_
NAME =aiops-gcp.
Note: Make sure to create a storage bucket in the GCP GUI where the FortiAIOps image files are
uploaded.
9. In the GCP portal, navigate to Compute Engine > Images and select the uploaded FortiAIOps image file.
10. Click Create instance and update the following configurations. For more information, see Create a VM.
l Enter a Name for the instance.
l Select the applicable Region from the list.
l In the Machine configuration, configure the E2 Standard with 4 VCPUs and 16 GB memory.
Note: It is recommended to use a minimum of 4 CPUs and a memory of 16 GB with the Intel Broadwell
CPU platform.
12. Click Advanced options to configure networking, disk and security parameters for the instance.
l Set the Network interface card to VirtIO .
l Select the Virtual Private Cloud (VPC) in the Network interfaces.
Note:Ensure that you create VPC networks to use as network interfaces for your instance, and provide
the IP address from specified subnets. To create and use a VPC network, see Create and manage
VPC networks.
l Select other network parameters such as IP stack, primary Internal IPv4 address, and external IPv4
address as depicted in this image.
Note: You can select the external IPv4 address as Ephermal (automatic /dynamic or static IP address.
). To create external IPv4 addresses for GCP, see Reserve a static external IP address.
13. Add another hard disk. In the Create an instance page, select Add New Disk and configure the following.
l Enter a disk Name.
l Set the Disk source type to Blank disk.
l Set the Disk type to Standard persistent disk.
l Set the disk Size to 100 GB
16. Click Create to complete installation. The newly created instance is listed in the VM instances page.
Select the instance and verify that the instance is running with the recommended CPU and machine
configurations.
l 514:514/udp
l 514:514/tcp
l 4013:4013/udp
l 4013:4013/tcp
l 443:443/tcp
l 80:80/tcp
Note: Ensure that all required TCP and UDP ports are enabled.
18. Connect the VM instance and login.
l To connect via the Compute Engine console, click VM Instances and select the VM instance that you
want to connect to. Click Connect to Serial Console. See Connect to the Serial Console. In the
console interface, login with the user name admin. A password in not required.
l To connect via the SSH, obtain the public IP address from the VM Instances interface and connect via
SSH. The get system interface command displays the internal IP address assigned to the
instance.
You can use the external IP address to access the FortiAIOps GUI, https: <external_IP_address>.
file://trust-policy.json
a. Create a policy for the Amazon S3 bucket and attach it to the AWS IAM user.
b. For user security credentials, create an access key (CLI) and download the CSV.
c. If you run the import2awsimg.sh manually, then un-comment the line 209 in Creare_vmimport_
role_and_policy.
Note:
l To import the VM, you must have read & write permissions to the Amazon bucket, EC2 Snapshot, and
image creation, and import permissions.
l Some AWS regions use /dev/xvda as the root device name instead of /dev/sda1 If you are
importing an image into a region that uses /dev/xvda, update the script by replacing all instances of
/dev/sda1 with /dev/xvda. For example, modify the block_device_mappings.json section of
the import2awsimg.sh by replacing /dev/sda1 with /dev/xvda.
8. Launch an instance from the Amazon Machine Images (AMI). Select Images > AMI in the EC2 service
interface and select the image that you just imported. Click Launch instance from AMI.
9. Add Name and tags for the instance, select the Instance type, set the Key pair, and configure the
Network settings based on your requirement. Select the required hard disk size in Configure storage.
The default size of disk storage 2 is10 GB, modify the size as per your requirement. Click Launch
instance.
10. Obtain the public IP address of the instance from the EC2 service interface and connect via a private key
using SSH.
Perform the following steps to deploy FortiAIOps on OCI, for more information, see OCI Documentation.
1. Obtain the file FAO_VM64_OCI-v2.1.0-[build0xxx].out.oci.zip from Fortinet.
2. To create a Bucket in OCI, log in to your OCI account and navigate to the Object Storage & Archive
Storage > Buckets > Create Bucket in the OCI portal.
3. Enter a unique name for your Bucket and select the relevant Compartment.
6. Select Custom Images and import the image; select the uploaded VMDK file in Object Name.
7. Search for the Block Volume Service and create block volume with 500 GB using the Custom option.
8. Navigate to Compute Service in the OCI portal and create an instance with the uploaded custom image.
9. Click Create instance and select the required Image and Shape Series. Set the number of CPUs to 4 and
RAM to 32 GB, as per your requirements. Wait for the import process to complete. This may take 6-10
minutes (approximately).
Wait for the import process to complete. This may take 6-10 minutes (approximately).
10. Save any private keys or SSH keys that you may need to access the instance.
11. After creating an instance, navigate to Attached block volumes and select the block volume created
earlier. The recommended attachment type is Paravirtualized.
The FAO-500G hardware platform comes with FortiAIOps pre-installed. Perform the following steps to deploy
and configure the device.
l Initial Configuration
l Accessing the GUI
Initial Configuration
After setting up and mounting the appliance on the rack, connect to the FortiAIOps 500G CLI using the console
port and perform the following steps. See, FortiAIOps 500G Quick Start Guide.
1. On the console Log in as an admin user with the username admin. A password is not required. You will be
prompted to configure a new password after the initial login.
This CLI password is separate from the GUI password. The default GUI credentials
are admin/admin.
2. Verify the dynamically assigned IP address using the command: get system interface
3. Configure a static IP address (recommended) using the command: config system interface
For a complete list of supported CLI commands, see Command Line Interface (CLI) Reference.
After completing the initial CLI configuration, you can access the FortiAIOps GUI.
1. Open a web browser and enter the following URL.
https://<fortiaiops_server_IP>
Replace <fortiaiops_server_IP> with the static IP address you configured.
2. Log in using the default GUI credentials.
admin/admin
Configuration Commands
Enable/disable
the system time
by synchronizing
with the NTP
server.
l set
ntpserver -
Configure the IP
address or
hostname of the
NTP servers (up
to 10).
Show Commands
Diagnostic Commands
Management Commands
System Information
Dashboard
The FortiAIOps dashboard provides a graphical overview of network elements, resource usage, AI insights, and
Service Assurance.
l Summary
l AI Insights
l Service Assurance
Summary
This dashboard provides visual summarization of key system information, network elements, and resource
usage. The interactive graphs and charts allow you to navigate into detailed views of network statistics for
analytical and monitoring purpose.
The data on this dashboard is automatically refreshed every 60 seconds; the following options are available to
manage the auto-refresh feature for this page.
l
Click to manually refresh data.
l
Click to pause the auto-refresh.
l
Click to resume the auto-refresh.
Use the Add Widget option to manage the widgets displayed on the dashboard; you can choose to add or
remove the widgets.
l Access Points CPU and Memory Usage – Displays the real-time FortiAP CPU and memory usage at a
given time and categorizes it as Low, Medium, High, and Critical. You can select the period to view the
resource usage (10 or 30 minutes, 1 or 12 hours, or 1 day). Click on the memory and CPU graphs to view
the details, as depicted in the following image.
l High Latency FortiGates - This widget displays the FortiGates with high latency determined based on the
timed out API request. Hover over the graph to view the number of FortiGates with high latency at a given
period of time and click on the graph to view the details of the FortiGates. You can select the period to view
the FortiGates (10 or 30 minutes, 1 or 12 hours, or 1 day).
Select a particular FortiGate and click View stats to view the details of the timed out APIs.
l FortiGate Events - Displays the FortiGate events at a given time and categorizes them based on the
severity level as, Information, Debug, Notice, Warning, Error, Critical, Emergency, and Alert. You can
select the period to view the data (10 or 30 minutes, 1 or 12 hours, or 1 day).
l Access Points - Displays the total number of access points in your network and their status (Online,
Offine, Waiting for Authorization, or Unknown). Click on the chart to navigate to Wireless > Access
Points.
l FortiSwitches - Displays the total number of FortiSwitches in your network and their status (Online, Offine,
Waiting for Authorization, or Unknown). Click on the chart to navigate to Switch > FortiSwitch.
l FortiSwitches Events - Displays the FortiSwitch events at a given time and categorizes them based on
the severity level as Information, Debug, Notice, Warning, Error, Critical, Emergency, and Alert. You can
select the period to view the data (10 or 30 minutes, 1 or 12 hours, or 1 day).
l Rogue APs - Displays the total number of rogue access points detected in your network. Click on the chart
to navigate to Wireless > Rogue APs.
AI Insights
The AI insights dashboard present data in various panels that is displayed in a series of charts and graphs, that
you can filter based on time duration. Navigate to Dashboard > AI Insights.
Clicking on the statistics of each of the panels in the dashboard displays detailed data graphically and in a
tabular format. The data displayed in tabular format is filterable based on the columns, you can group data by a
specific column or filter data for specific values. This is an example.
Dashboard data is refreshed at a configurable interval. Use the Add Widget option to manage the widgets
displayed on the dashboard; you can choose to add or remove the widgets.
l Summary
l Impacted Clients Trend on page 76
l Overall Network Health
l Top 3 Impacted Apps
l Top 5 Problematic Devices
l Wireless
l WAN
l Switching
Summary
The Summary panel displays data in charts and statistics for the total number of connected and impacted
clients for switching, wireless, and WAN. FortiAIOps displays the connected and impacted client count during
the selected duration in the dashboard. Clicking on the donut chart for the connected clients or the statistics for
the impacted clients in this panel, re-directs you to the Impacted Devices page.
The Impacted Clients Trend panel displays data trends for the total number of impacted clients for switching,
wireless, and WAN, over a period of time.
Click on any given time interval for the impacted clients to view the Impacted Clients page. This page displays
details of the various devices in your network that are associated with impacted clients. The following image
depicts an example of the impacted WAN clients.
The data is displayed in the following three panels. For more information on the data and fields displayed on this
page, see Impacted Devices.
l FortiGates - Displays the number of deployed FortiGate controllers with impacted wireless, switching, and
WAN clients.
l Access Points/ Switches/ Interfaces/FortiExtenders - Displays the number of devices, that is, APs,
interfaces, FortiExtenders, and switches with impacted clients.
l Clients - Displays the number of impacted clients for the wireless, switching, and WAN.
This panel displays the overall client count trends and health status of all wireless, switching, and WAN clients
connected to your network, at specific intervals of 15 minutes. You can view the total number of clients in your
network and the number of impacted clients at a given point in time.
Hover over the line to view the total number of clients and the line to view the number of impacted clients. In
this example, at 03.30 hours, a total of 145 clients were present in the network of which 32 clients are impacted.
Click on any given time interval for total clients to view the Connected Clients panel. The data displayed in
tabular format in all the monitor dashboard pages is filterable based on columns, you can group data by a
specific column or filter data for specific values.
Click the AP Name to view the FortiAP details and the operational status of the radios.
Click on any given time interval for total clients to view the Overall Network Health panel. This page displays
details of the various devices in your network that are associated with impacted clients. The number of devices
are listed for each category, you can click on any of these or click on the respective section in the donut chart to
view details. The data is displayed in the following three panels. Refer to Impacted Devices for more
descriptions.
FortiGates - Displays the number of deployed FortiGate controllers with impacted wireless, switching, and
WAN clients.
l Access Points/ Switches/ Interfaces/FortiExtenders - Displays the number of devices, that is, APs,
interfaces, FortiExtenders, and switches with impacted clients.
l Clients - Displays the number of impacted clients for the wireless, switching, and WAN.
Click on the impacted SLA to view the device topology.
This panel displays the 3 conference applications running on client devices that are most impacted. These
applications are Microsoft Teams calls, Google Meet, Zoom, WhatsApp audio and video call, and Apple
FaceTime. To view the details, click on the bar in the chart or on the name of the application displayed in the
panel.
The applications are classified as impacted based on the downtime it experiences during various sessions in
the selected time period. You can view the downtime for the latest session and the number of sessions.
Furthermore, click on the number of sessions to view the downtime and other details for each session.
Note: For accurate applications related data in this panel, renew the FortiGuard license for general updates,
including application control signatures for application detection.
This panel displays the 5 devices with the highest number of impacted clients. The devices displayed here can
be FortiAPs, FortiSwitches, FortiExtenders, and/or interfaces. The device name and the number of associated
clients that are impacted are displayed in descending order.
Wireless
The Wireless panel displays the details of impacted SLAs with the associated device and client details. The
Clients view displays the impacted client count and the Devices view displays the impacted AP count.
The impacted SLAs are detected and reported by FortiAIOps with device and client details. The issues reported
are categorized based on classifiers and sub-classifiers, with suggested remedial measures to curtail the SLA
breaches and enhance network performance. The data displayed in this panel is for the time period set in the
dashboard. If you select the Devices view in the Wireless panel and click on any SLA in the impacted SLAs list
or click on the bar in the chart, the impacted devices details such as, AP name, AP serial number, AP IP
address, AP status (online/offline) and state, FortiGate host name and serial number, and classifier and sub-
classifier are displayed.
If you select the Clients view in the Wireless panel and click on any SLA in the impacted SLAs list or click on
the bar in the chart, the impacted client details, such as, MAC address, hostname, associated SSID and
channels, the AP name, IP address, and serial numbers, the associated FortiGate hostname and serial number,
and the classifier and sub-classifers are displayed.
Select any row and click View Topology to view a simplified topology with a visualization/illustration of the
physical placement of devices, such as, FortiGates, FortiSwitches, and FortiAPs connected to each other in
your network. This hierarchical pattern is representational; you cannot modify the placement of devices on this
page. The topology displays the impacted devices, categorized based on their SLAs, classifiers, and sub-
classifiers. The details of the topologies are described for each SLA in the following sections. You can toggle
between different impacted SLAs on this page and filter data based on the impacted classifier and sub-
classifier.
l Throughput
l Connection Failure
l Time to Connect
l Coverage
l Roaming
l AP Health and Uptime
Throughput
This SLA monitors your network for low throughput conditions and reports clients/devices based on dynamically
configured threshold breaches.
The Details table displays information such as the impacted radios for the reported classifiers and sub-
classifiers, issue description and the suggested remediation measure, and so on are displayed. Right-click on
the header of the table to select the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Sub Classifiers The sub-classifier of the issue for the reported classifier.
Issue Cause List Detailed cause of the SLA breach that impacted the client/AP/FortiGate.
AP Serial Number The AP serial number that the client associated with.
FortiGate Hostname The hostname of the FortiGate associated with the AP/impacted client.
Radio Impacted Minutes The duration (in minutes) that the radio was impacted for.
In the impacted details displayed, select a specific row of throughput failure and click View Details. You can
view details of the impacted AP and issue diagnostics. You can view throughput logs related to Diagnostics
with the issue description and the suggested remediation, AP Stats with the associated AP radio details, AP
Logs with the time of the throughput failure event and the associated AP details, Switch Info with the switch
port details connected to the AP, WIFI Clients with details of the impacted clients and a list of all WiFi clients,
Interfering APs with the BSSID and the signal strength of the interfering APs.
Logs Description
Diagnostics This tab provides detailed cause of the SLA breach that impacted the
client/AP/FortiGate. FortiAIOps also suggests the remedy to resolve the
issue.
AP Stats This tab displays the details of the AP radio that the client associated with
and the WAN status details of the AP.
Logs Description
AP Logs This tab provides the AP event logs generated from FortiGate.
Switch Info This tab displays the configuration details of the switch port connected to
the AP.
Neighbour APs This tab displays details of the detected neighbour APs by the client, for
distant client & coverage hole issues.
WIFI Clients This tab provides details of the impacted clients and also lists all the clients
associated with the AP.
Interfering APs This tab displays details of the interfering APs in your network.
Logs Description
Connection Failure
Displays the failed/unsuccessful client connections based on different stages of connection to a network. For
example, association failures due to low RSSI, authentication failures due to unreachable RADIUS server,
DHCP failure due to a DHCP server process crash, or DNS failure due to an invalid DNS domain.
The Details table displays details such as the client MAC address, the associated AP serial number and the
SSID, the issue classifier/category and the sub-classifier, the issue description and the suggested remediation
measure, and so on are displayed. Right-click on the header of the table to select the columns that you wish to
view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Access Point The name of the AP that the impacted client associated with.
Sub Classifier The sub-classifier of the issue for the reported classifier.
Issue Cause List The detailed causes of the SLA breach that impacted the
client/AP/FortiGate.
Attribute Description
AP Serial Number The AP serial number that the client associated with.
FortiGate Hostname The hostname of the FortiGate associated with the AP/impacted client.
Select a specific client and click View Logs. You can view Client Details such as the client device name, the
name of the AP it is associated with and the time of association, associated SSID, and operational details such
as the channel and the MIMO mode. The client Status such as the associated bandwidth (2.5GHZ/5GHZ),
signal strength (RSSI), signal noise, rate of transmission discard and rate of transmission retry between the
client and the AP. The Client Logs display the time stamp of each action and action classification as notice,
warning, etc., and the action details and the associated channel.
Time to Connect
Displays the details of clients that breach the SLA threshold values for these stages of connection,
Association, Authentication, DHCP, and DNS. The actual value of time taken and the configured Time to
Connect threshold values (static/dynamic) are compared. For SLA configurations, see Time To Connect.
The Details table displays details such as the client MAC address, the associated AP serial number and the
SSID, the issue classifier/category and the sub-classifier, the issue description and the suggested remediation
measure, and so on are displayed. Right-click on the header of the table to select the columns that you wish to
view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Sub Classifier The sub-classifier of the issue for the reported classifier.
Signal Strength The signal strength of the client at the time of impact.
Issue Cause List The detailed causes of the SLA breach that impacted the
client/AP/FortiGate.
Access Point The name of the access point that the client associated with.
AP Serial Number The AP serial number that the client associated with.
FortiGate Hostname The hostname of the FortiGate associated with the AP/impacted client.
Association Time The total time taken by the client for association.
Attribute Description
Authentication Time The total time taken by the client for authentication.
DNS Time The total time taken by the client to resolve the DNS request.
DHCP Time The total time taken by a client to receive a DHCP address.
Select a specific row and click View Logs to view the raw logs associated with the impacted client. You can
view Client Details such as the client device name, the name of the AP it is associated with and the time of
association, associated SSID, and operational details such as the channel and the MIMO mode. The client
Status such as the associated bandwidth (2.5GHZ/5GHZ), signal strength (RSSI), signal noise, rate of
transmission discard and rate of transmission retry between the client and the AP. The Client Logs display the
time stamp of each action and action classification as notice, warning, etc., and the action details and the
associated channel.
Coverage
This SLA monitors your network for coverage issues and reports clients/devices based on dynamically
configured threshold breaches.
The Details table displays issue details such as the radio type, Tx power, neighbour AP count, the issue
classifier/category and the sub-classifier, the issue description and the suggested remediation measure, and so
on are displayed. Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Sub Classifiers The sub-classifiers of the issue for the reported classifier.
Issue Cause List The detailed causes of the SLA breach that impacted the
client/AP/FortiGate.
Radio Type The impacted radio and band information associated with the client.
Radio Impacted Minutes The duration of time (in minutes) that the Radio was impacted.
AP Serial Number The AP serial number that the client associated with.
FortiGate Hostname The hostname of the FortiGate associated with the AP/impacted client.
Radio Type The impacted radio and band associated with the client.
Attribute Description
To view the logs, select a specific row of an AP event and click View Logs. You can view coverage logs related
to Diagnostics with the issue description and the suggested remediation, AP Stats with the associated AP
radio details, AP Logs with the time of the throughput failure event and the associated AP details, Switch Info
with the switch port details connected to the AP, WIFI Clients with details of the impacted clients and a list of all
WiFi clients, Interfering APs with the BSSID and the signal strength of the interfering APs.
Logs Description
Diagnostics This tab provides detailed cause of the SLA breach that impacted the
client/AP/FortiGate. FortiAIOps also suggests the remedy to resolve the
issue.
Logs Description
AP Stats This tab displays the details of the AP radio that the client associated with
and the WAN status details of the AP.
AP Logs This tab provides the AP event logs generated from FortiGate.
WIFI Clients This tab provides details of the impacted clients and also lists all the clients
associated with the AP.
Interfering APs This tab displays details of the interfering APs in your network.
Roaming
Slow roaming clients are detected based on the variation of the classifier threshold values set by the users or
calculated dynamically by FortiAIOps. The parameters to identify slow roaming clients are Fast BSS
Transition Roams, PMK Cache, and Opportunistic Key Caching Roams. Any breach in the threshold
values are detected and reported. For SLA configurations, see Roaming.
The Details table displays details such as the client MAC address, the associated AP serial number and the
SSID, the issue classifier/category and the sub-classifier, the issue description and the suggested remediation
measure, and so on. Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Device The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Sub Classifier The sub-classifier of the issue for the reported classifier.
Roaming Delay The delay (latency) in client roaming (milliseconds) in case of threshold
breach.
Roaming Time The duration of time the client was roaming the network.
AP Serial Number The AP serial number that the client associated with.
Issue Cause List detailed cause of the SLA breach that impacted the client/AP/FortiGate.
To view the logs, select a specific row of an AP event and click View Logs. You can view client details such as
Diagnostics with the issue description and the suggested remediation, AP Stats with the associated AP radio
details, and Client Logs with details of the impacted clients.
Logs Description
Diagnostics This tab provides detailed cause of the SLA breach that impacted the client.
FortiAIOps also suggests the remedy to resolve the issue.
AP Stats This tab displays the details of the AP radio that the client associated with.
Logs Description
In the various throughput logs displayed, you can right-click on the table header to select the details you want to
view.
Displays the AP health based on the configured AP health threshold values and the AP down status due to
AP/FortiGate reboot, disabled switch port etc. For SLA configurations, see Device Health.
The Details table displays issue details such as the issue classifier/category and the sub-classifier, the issue
description and the suggested remediation measure, and so on. Right-click on the header of the table to select
the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
FortiSwitch Name The name of the switch associated with the impacted AP/client.
Issue Cause List The detailed causes of the SLA breach that impacted the
client/AP/FortiGate.
Attribute Description
Sub Classifier The sub-classifier of the issue for the reported classifier.
AP Serial Number The AP serial number that the client associated with.
FortiGate Hostname The hostname of the FortiGate associated with the AP/impacted client.
FortiSwitch Serial Number The serial number of the switch associated with the impacted AP/client.
Logs Description
Diagnostics This tab provides detailed cause of the SLA breach that impacted the
client/AP/FortiGate. FortiAIOps also suggests the remedy to resolve the
issue.
AP Stats This tab displays the details of the AP radio that the client associated with
and the WAN status details of the AP.
Logs Description
WIFI Clients This tab provides details of the impacted clients and also lists all the clients
associated with the AP.
Interfering APs This tab displays details of the interfering APs in your network.
Select any impacted client and click Show AP details to view the detailed AP logs.
Select any of the tabs to view the data described in this table.
Logs Description
Diagnostics This tab provides detailed cause of the SLA breach that impacted the
client/AP/FortiGate. FortiAIOps also suggests the remedy to resolve the
issue.
AP Stats This tab displays the details of the AP radio that the client associated with
and the WAN status details of the AP.
Interfering APs This tab displays details of the interfering APs in your network.
Logs This tab provides the AP event logs generated from FortiGate.
WAN
The WAN panel displays the performance SLA metrics to monitor WAN member interface link quality and to
detect failures and FortiExtender health data, along with the impacted client details. Any client that breaches the
configured SLA thresholds are reported. In each SLA panel, you can select Clients to view the impacted client
count or click Devices to view the impacted interface count.
You can click on the impacted SLA listed in the panel to view the Performance or FortiExtender Health
impacted interface and client details. The issues reported are categorized based on classifiers and sub-
classifiers, with suggested remedial measures. The data displayed in this panel is for the time period set in the
dashboard.
Performance SLA
If you select the Devices view in the WAN panel and click on the Performance SLA in the impacted SLAs list or
click on the bar in the chart, the impacted interfaces' details such as, destination interface, the associated
FortiGate host name, IP address, and serial number, FortiSwitch serial number, and classifier and sub-classifier
are displayed.
If you select the Clients view in the WAN panel and click on the Performance SLA in the impacted SLAs list or
click on the bar in the chart, the impacted client details, such as, MAC address, the AP name and serial
numbers, the associated FortiGate hostname and serial number, FortiSwitch name and serial number,
destination interface, and the classifier and sub-classifers are displayed.
Select a row and click View Topology. The Details table displays the following information.
Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Issue Cause List The detailed causes of the SLA breach that impacted the
Attribute Description
client/AP/FortiGate.
Sub Classifier The sub-classifier of the issue for the reported classifier.
Packet Loss The percentage of packet loss reported for the client.
FortiGate Hostname The hostname of the FortiGate associated with the AP/impacted client.
If you select the Devices view in the WAN panel and click on the FortiExtender Health SLA in the impacted
SLAs list or click on the bar in the chart, the impacted interfaces' details such as, destination interface, AP serial
number, the associated FortiGate host name, IP address, and serial number, FortiSwitch serial number,
FortiExtender name and serial number, and classifier and sub-classifier are displayed.
If you select the Clients view in the WAN panel and click on the FortiExtender Health SLA in the impacted SLAs
list or click on the bar in the chart, the impacted client details, such as, MAC address, the AP name and serial
number, the associated FortiGate hostname and serial number, FortiSwitch name and serial number,
FortiExtender name and serial number, destination interface, and the classifier and sub-classifers are
displayed.
Select a row and click View Topology. The Details table displays the following information.
Right-click on the header of the table to select the following columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Issue Cause List The detailed cause of the SLA breach that impacted the
client/AP/FortiGate/FortiExtender.
Attribute Description
Sub Classifier The sub-classifier of the issue for the reported classifier.
FortiGate Hostname The hostname of the FortiGate with which the impacted FortiExtender is
associated.
Select a particular client and click View Logs, to view the impacted client logs.
Switching
The Switching panel displays the total number of impacted clients and SLA data. Select Devices to view the
impacted switch count or click Clients to view the impacted client count.
Notes:
l Ensure that all L2 security features, such as, BPDU guard, loop guard, DHCP snooping, root guard are
enabled on the switch port to detect STP and DHCP failures.
l DHCP failures are reported only for DHCP configurations in the FortiSwitch, such as, DHCP client blocked,
DHCP lease full.
The following SLAs are detected and reported by FortiAIOps for switching. The issues reported are categorized
based on classifiers and sub-classifiers, with suggested remedial measures to curtail the SLA breaches and
enhance network performance.
l Throughput
l Network
l Switch Connection Failure
l Switch Health and Uptime
Throughput
Displays potential low throughput conditions, in this page you can view the details of the throughput SLA.
The Throughput table displays information such as the client MAC address, the associated FortiSwitch details,
and port details for the reported classifiers and sub classifiers, issue description and the suggested remediation
measure, and so on are displayed. Right-click on the header of the table to select the columns that you wish to
view.
Attribute Description
FortiGate Hostname The hostname of the FortiGate associated with the FortiSwitch/impacted
client.
FortiSwitch Name The name of the FortiSwitch that the impacted client associated with.
Sub Classifier The sub-classifier of the issue for the reported classifier.
FortiGate Serial Number The serial number of the FortiGate associated with the
FortiSwitch/impacted client.
FortiSwitch Serial Number The serial number of the FortiSwitch associated with the
FortiSwitch/impacted client.
Select a row and click View Topology. The Details table displays the following information.
Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Attribute Description
Client MAC Address The MAC address of the impacted client device.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Issue Cause List Detailed cause of the SLA breach that impacted the client/switch.
Sub Classifier The sub-classifier of the issue for the reported classifier.
FortiGate Hostname The hostname of the FortiGate associated with the impacted client.
FortiGate Serial Number The serial number of the FortiGate associated with the impacted client.
To view the Switch logs, select a specific row of a Throughput event and click View Logs. You can view Switch
details and diagnostics with the issue description and the suggested remediation, along with the FortiSwitch
port statistics.
Network
Displays potential network disruptions that may lead to poor connectivity, in this page you can view the details of
the Network SLA.
Note: The broadcast/multicast storm rate threshold is set to 500 packets per second, storm conditions are
reported when this condition is detected. The storm conditions are detected based on this threshold, even if a
different storm control policy is configured in FortiGate.
The Network table displays information such as the client MAC address and the associated FortiSwitch details
for the reported classifiers and sub classifiers, issue description and the suggested remediation measure, and
so on are displayed. Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
FortiGate Hostname The hostname of the FortiGate associated with the FortiSwitch/impacted
client.
FortiSwitch Name The name of the FortiSwitch that the impacted client associated with.
Attribute Description
Sub Classifier The sub-classifier of the issue for the reported classifier.
FortiGate Serial Number The serial number of the FortiGate associated with the
FortiSwitch/impacted client.
FortiSwitch Serial Number The serial number of the FortiSwitch associated with the
FortiSwitch/impacted client.
Select a row and click View Topology. The Details table displays the following information.
Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Client MAC Address The MAC address of the impacted client device.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Issue Cause List Detailed cause of the SLA breach that impacted the client/switch.
Attribute Description
Sub Classifier The sub-classifier of the issue for the reported classifier.
FortiGate Hostname The hostname of the FortiGate associated with the impacted client.
FortiGate Serial Number The serial number of the FortiGate associated with the impacted client.
To view the Switch logs, select a specific row of Network SLA event and click View Logs. You can view Switch
details and diagnostics with the issue description and the suggested remediation, along with the FortiSwitch
port statistics.
Displays the switch health based on the configured switch health threshold values and the status of the switch
(Up/Down). The associated impacted FortiGate controller, switch, and client count are displayed in a collapsible
topology. If you select the Devices view in the Switching panel and click on the SLA in the impacted SLAs list or
click on the bar in the chart, the impacted switches' details such as, OS version, the associated FortiGate host
name and serial number, FortiSwitch name and serial number, FortiSwitch state and status, and classifier and
sub-classifier are displayed.
If you select the Clients view in the Switching panel and click on the SLA in the impacted SLAs list or click on
the bar in the chart, the impacted client details, such as, MAC address, OS version, the associated FortiGate
host name and serial number, FortiSwitch name and serial number, FortiSwitch state and status, and classifier
and sub-classifier are displayed.
Select a row and click View Topology. The Details table displays the following information.
Right-click on the header of the table to select the following columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Client MAC Address The MAC address of the impacted client device.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Issue Cause List Detailed cause of the SLA breach that impacted the client/switch.
Sub Classifier The sub-classifier of the issue for the reported classifier.
FortiGate Hostname The hostname of the FortiGate associated with the impacted client.
Attribute Description
FortiGate Serial Number The serial number of the FortiGate associated with the impacted client.
Select a particular switch and click View Logs, the issue diagnostics and the suggested remedy are displayed.
The Logs tab displays the time stamp of each action, the type of action such as notice, warning, etc., and the
impact details are displayed. Different data tabs are displayed based on the selected issue/failure.
Displays the failed/unsuccessful client connections based on authentication events such as MAC authentication
and 801x authentication and MAC learning limit.
Select a row and click View Topology. The Details table displays the following information.
Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
Date/Time The date and time of the impact as per your timezone.
Client MAC Address The MAC address of the impacted client device.
Hostname The name of the device as configured by the user. If the name is not
configured or available, then MAC address is displayed.
Issue Cause List Detailed cause of the SLA breach that impacted the client/switch.
Sub Classifier The sub-classifier of the issue for the reported classifier.
FortiGate Hostname The hostname of the FortiGate associated with the impacted client.
FortiGate Serial Number The serial number of the FortiGate associated with the impacted client.
Select a particular switch and click View Logs, the issue diagnostics and the suggested remedy are displayed.
The Logs tab displays the time stamp of each action, the type of action such as notice, warning, etc., and the
impact details are displayed. Different data tabs are displayed based on the selected issue/failure.
Service Assurance
The Service Assurance dashboard for FortiAIOps is designed to provide comprehensive insights and
monitoring of network performance. It consists of various widgets that offer visual representations and
classifications of different metrics.
The data on this dashboard is based on scheduled test results and is automatically refreshed every 60 seconds;
the following options are available to manage the auto-refresh feature for this page.
l
Click to manually refresh data.
l
Click to pause the auto-refresh.
l
Click to resume the auto-refresh.
The dashboard provides an option to select the duration of the data displayed. You can choose between 1 day,
1 week, 1 hour, and 10 minutes.
Use the Add Widget option to manage the widgets displayed on the dashboard; you can choose to add or
remove the widgets.
Right-click on the header of the table to select the columns that you wish to view.
Attribute Description
AP Name The name of the access point used during the test.
Start Time The timestamp indicating when the test was initiated.
Attribute Description
Packet Loss The amount of data lost during transmission, expressed as a percentage.
Throughput The measured network throughput, indicating the amount of data transferred.
l Connectivity - This widget displays the measured Connectivity results using a bar chart and classifies the
results as Good, Fair, or Bad. Connectivity refers to the ability of devices to establish and maintain a
connection to the network.Click on the charts to view additional information.
l RF Health - This widget displays the radio frequency (RF) health based on the Service Assurance
Manager (SAM) Connectivity and Throughput test results for each RF Band(2.4GHz/ 5GHz). Click on the
charts to view additional information.
l Top 5 APs by Failure - This widget displays a sorted list of Access Points (APs) based on the highest
number of bad results. Click on the charts to view additional information.
l Top 5 SSIDs by Failure - This widget displays a sorted list of SSIDs based on the highest number of bad
results. Click on the charts to view additional information.
l Channel Health - This widget displays the overall health of the network channels based on the SAM
Connectivity and Throughput test results. Click on the charts to view additional information.
AI Insights
This section describes the FortiAIOps AI enabled data insights of your network and SLA configurations.
l Impacted SLA
l Impacted Devices
l Network Benchmarks
Impacted SLA
This page displays the impacted wireless, switching, and WAN clients, categorized based on their SLAs,
classifiers, and sub-classifiers. Select any SLA and the associated classifier and sub-classifier charts are
displayed. You can filter and view the SLAs as per any of these categories. In each impacted SLA panel for
wireless, switching, and WAN, you can select Clients to view the impacted client count or click Devices to view
the impacted device count. Navigate to AI Insights > Impacted SLA.
Wireless
The wireless SLA data is reported based on the classifiers and sub-classifiers displayed in this panel. The SLA
data tables lists the client MAC address and hostname, FortiGate hostname and serial number, AP name,
IP address, and serial number, classifier and sub-classifier, the associated SSID, and the operating channel.
Select any row and click on View topology to view the impacted SLA details.
Switching
The switching SLA data is reported based on the classifiers and sub-classifiers listed displayed in this panel.
The SLA data tables lists the client MAC address and hostname, FortiGate hostname and serial number,
FortiSwitch name, serial number, and OS version, classifier and sub-classifier, FortiSwitch state and status
(online/offline). Select any row and click on View topology to view the impacted SLA details.
WAN
The WAN SLA data is reported based on the classifiers and sub-classifiers displayed in this panel. The SLA
data tables lists the client MAC address and hostname, FortiGate hostname and serial number, FortiSwitch
name and serial number, AP name and serial number, classifier and sub-classifier, and the destination
interface. Select any row and click on View topology to view the impacted SLA details.
Select any device listed in the tables and click on View Topology for topology and other details. For details on
the SLAs, topology, and logs, see section AI Insights.
Impacted Devices
This page displays details of the various devices in your network that are associated with impacted clients, that
include the wireless, switching, and WAN clients. You can view and analyze the SLA data based on the device
type. The data is displayed in the following three panels. The number of devices are listed for each category,
you can click on any of these or click on the respective section in the donut chart to view details. Navigate to AI
Insights > Impacted Devices.
FortiGates
Displays the number of deployed FortiGate controllers with impacted wireless, switching, and WAN clients.
The following example displays the FortiGates-Wireless SLA with information such as FortiGate host name,
serial number, and IP address, and lists the impacted APs, clients, and SLAs. Select any row and click on the
impacted SLA name to view the topology. Data is displayed for FortiGate wireless clients based on the selected
SLA breaches only.
The following example displays the FortiGates-WAN SLA with information such as FortiGate host name, serial
number, and IP address, and lists the impacted APs, clients, SLAs, switches, and interfaces. Select any row
and click on the impacted SLA name to view the topology.
The following example displays the FortiGates-Switching SLA with information such as FortiGate host name,
serial number, and IP address, and lists the impacted clients, SLAs, and switches. Select any row and click on
the impacted SLA name to view the topology.
Displays the number of devices, that is, APs, interfaces, FortiExtenders, and switches with impacted clients.
The following example displays the Access Points with information such as AP name, serial number, and IP
address, FortiGate host name and IP address, and lists the impacted clients and SLAs. Select any row and click
on the impacted SLA name to view the topology.
The following example displays the Interfaces with information such as the interface, FortiGate host name,
serial number, and IP address, and lists the impacted clients and SLAs. Select any row and click on the
impacted SLA name to view the topology.
The following example displays the Switches with information such as the switch host name, IP address, OS
version, and serial number, FortiGate host name, serial number, and IP address, and lists the impacted clients
and SLAs along with the status and state of the switch. Select any row and click on the impacted SLA name to
view the topology.
The following example displays the FortiExtenders with information such as the interface, FortiGate host name,
and FortiExtender name, and lists the impacted clients and SLAs. Select any row and click on the impacted SLA
name to view the topology.
Clients
Displays the number of impacted clients for the wireless, switching, and WAN.
The following example displays the Wireless Clients with information such as the FortiGate host name, serial
number, and IP address, AP name and IP address, client MAC address, and the impacted SLAs. Select any row
and click on the impacted SLA name to view the topology.
The following example displays the WAN Clients with information such as the FortiGate host name, serial
number, and IP address, AP name, IP address, and serial number, switch name, IP address, and serial number,
client MAC address, interface details, and the impacted SLAs. Select any row and click on the impacted SLA
name to view the topology.
The following example displays the Switching Clients with information such as the FortiGate host name, serial
number, and IP address, switch name, IP address, OS version, state, and status, client MAC address, and the
impacted SLAs. Select any row and click on the impacted SLA name to view the topology.
Network Benchmarks
This section explains how to configure SLA metrics to define values to match network deployment and required
thresholds. Navigate to AI Insights > SLA configuration.
l SD-WAN
l Wireless
l Device Health
SD-WAN
The SD-WAN SLA monitors and measures the health of links that are connected to SD-WAN member
interfaces based on the latency, jitter, and packet loss metrics. This enables the selection of an optimal link for
traffic routing, that prevents traffic from being sent to broken links and getting lost. Thereby, enhancing network
performance and reliability.
The SD-WAN page provides detailed link quality measurements with advanced AI insights, to forecast potential
issues in the SD-WAN links. It summarizes the overall network health and provides performance data in terms
of statistics and trends of latency, jitter, and packet loss metrics.
FortiAIOps base-lines the acceptable link performance of the deployed network to detect and report anomalies
in case of SLA breaches. The range and baseline of performance metrics is identified based on historical data,
to forecast and report any deviations. This ability of FortiAIOps to forecast the performance of the network,
prepares you to effectively handle performance issues that might affect the network health.
FortiAIOps monitors and forecasts latency, jitter, and packet loss for the upcoming week based on available
SLAs. It monitors the real time performance of the network to report any changes in the SD-WAN link
performance.
l Pre-requisites
l Recommendations
Pre-requisites
The SD-WAN SLA monitors and measures the health of links that are connected to SD-WAN members based
on SLA log messages (pass and fail), to predict the performance. Configure the SD-WAN health check in
FortiGate as shown in the following example.
config system sdwan
config health-check
edit "<Health Check Name>"
set sla-fail-log-period 60
set sla-pass-log-period 60
For more details, see Link Health Monitor.
Recommendations
Fortinet recommends the following for best usage of the FortiAIOps capabilities.
l Use a time interval of 60 seconds for sla-fail-log-period and sla-pass-log-period for high
accuracy.
l Enable ntp sync for accurate SD-WAN forecast and anomaly detection.
Navigate to AI Insights > SD-WAN and select the FortiGate, corresponding health check, and the interface that
you want to analyze.
l Configure Baselines
l Performance Summary
l Health Check Trends
l Anomalies
Configure Baselines
Performance SLA baselines are used as the benchmark to analyze the network, forecast its performance, and
detect anomalies. You can enable static or dynamic thresholds for assessing the performance of the SD-WAN
links. Click Manage Baselines.
l Static Baseline - These baselines are SLA targets configured in FortiGate or FortiAIOps default
thresholds, for jitter, packet loss, and latency. If the SLA targets are not specified in FortiGate, then the
following default baselines are used for all the 3 metrics.
l Latency - 100 ms
l Jitter - 30 ms
l Packet Loss - 1 %
Dynamic Baseline - These baseline values are calculated using real-time data from the previous week
and are updated dynamically, every week, for jitter, packet loss, and latency. This is the default baseline
mode.
Note: Fortinet recommends to use SLA targets for the Performance SLA, when static mode is used. The SLA
targets are a set of constraints that are used in SD-WAN rules to control the paths that traffic takes. The
constraints are configured using the FortiGate GUI and CLI. For more information, see Link health monitor.
Performance Summary
The Performance Summary panel provides the statistics for the WAN interface's performance based on the
jitter, packet loss, and latency metrics. The events reported are categorized as good, fair, and bad, based on the
metric performance with respect to the configured or calculated thresholds. This shows overall summary of the
performance metrics, availability of network, and issues for the selected interval. Hover the cursor over the chart
to see the break-up of the statistics.
To learn more about the SD-WAN interface performance prediction based on the FortiAI insights, click Show
FortiAI Insights.
The health check graphs display the performance trends for packet loss, latency, and jitter against the
predicted/forecasted values, with the anomalies for the selected interface. A comparative view between the
following statistics is offered.
Note: The trends displayed are on an hourly basis.
l Forecast - This is indicative of the range predicted by FortiAIOps based on historical statistics.
l Observed Data - This is the range of real time statistics observed in a given hour.
l Anomaly - Anomalies are reported when FortiAIOps observes a deviation in the data exceeding the usual
variation in the network, or exceeds the static/dynamic baselines.
l Static Threshold - Static SLA baselines are SLA targets that are configured in FortiGate or FortiAIOps
default thresholds.
Hover the cursor over the graph to view the statistics for each performance metric. Clicking on anomaly point in
the trend graph displays the details.
l Insights - This provides the impact analysis for the anomaly that includes the performance summary
categorizing the events as good, bad, and fair, the statistics for the impacted clients and the duration of the
impact. FortiAIOps lists the cause of the anomaly with the recommended action. The incident timeline
provides statistics for when the metric exceeds the threshold values and the observed variation thresholds.
l General Information - This provides general information about the detected anomaly such as, the
duration, the FortiGate host name, interface, configured health check, and so on.
Anomalies
As mentioned earlier, anomalies are reported when a High Variation in performance is detected as compared
to the usual variations in the network or when the performance exceeds the configured Upper Threshold for
static or dynamic baselines. The details of these anomalies is displayed in the trend graphs, offering an in-depth
analysis of the overall health of the jitter, latency, and packet loss metrics.
Using the anomaly charts, you can view the total number of anomalies classified into high variation, SLA down,
and above expected thresholds for the selected duration. Click on the icon for additional information.
l Latency/Jitter/Packet Loss Threshold - Anomaly observed due to data exceeding the expected
threshold.
l Variation Threshold - Anomaly observed due to variation exceeding the expected variation.
l SLA Down - Anomaly observed due to performance SLA being down.
Wireless
Time To Connect
You can configure static thresholds or enable FortiAIOps to compute them dynamically. Based on the
configured thresholds, the variations in the time to connect are recorded for each phase, and the statistics are
displayed in the AI Insights tab.
Dynamic Baselines
You are required to provide the following information for threshold/baseline configuration.
l Scope - Select the scope to calculate the thresholds which could either be per Device Group, per
FortiGate, or per AP.
l Time Selection - Set the time range/duration for which FortiAIOps analysis client data to derive the
thresholds.
l Schedule Baselines Computation - Set the time when FortiAIOps calculates the baselines and applies
them to your network to obtain and report the relevant SLAs.
l Repeat Cycle - Configure the repetition of the above configurations, that is, the phase of analyzing client
activity and the calculation/application of the algorithms.
The baseline values calculated by FortiAIOps are displayed in the table. You can re-compute specific baseline
values.
Static Threshold
Configure the time (milliseconds) for the following stages of client connection to a network.
Roaming
You can configure static thresholds or enable FortiAIOps to compute them dynamically. Based on the
configured thresholds, the variations in the time to connect are recorded for each phase, and the statistics are
displayed in the AI Insights tab.
Dynamic Baselines
You are required to provide the following information for threshold/baseline configuration.
l Scope - Select the scope to calculate the thresholds which could either be per Device Group, per
FortiGate, per AP, or per SSID.
l Time Selection - Set the time range/duration for which FortiAIOps analysis client data to derive the
thresholds.
l Schedule Baselines Computation - Set the time when FortiAIOps calculates the baselines and applies
them to your network to obtain and report the relevant SLAs.
l Repeat Cycle - Configure the repetition of the above configurations, that is, the phase of analyzing client
activity and the calculation/application of the algorithms.
The baseline values calculated by FortiAIOps are displayed in the table. You can re-compute specific baseline
values.
Static Threshold
For static threshold configuration to enable faster roaming, configure the following parameters.
l Fast BSS Transition Roams(11r) - This is implemented as part of the 802.11r standard and enables fast
roaming of wireless clients by pre-authenticating them with several APs in the network; this pre-
authentication is done prior to when the client begins roaming. This feature allows immediate BSS
transitions between APs and curtails the latency caused by deferred data connectivity, often experienced
when a client has to transition from one BSS to another while roaming in a multi-AP deployment. The
default roaming time value is 55 ms and the valid range is 1 - 600000 ms.
Note: To use this feature of FortiAIOps, ensure that the wireless client supports 802.11r standard enable
802.11r roaming on the SSID using the set fast-bss-transition CLI commands on FortiGate.
l PMK Cache Roams – The Pairwise Master Key (PMK) caching enables a wireless client to re-associate
with an AP without re-authenticating. When a wireless client associates with an AP through the 802.1x
authentication process, a master key negotiated with the AP is stored in a cache. When the client roams to
different APs and then wants to re-associate with this AP again, then the already cached PMK is used for
authentication. This significantly reduces the authentication time as the client-AP are not required to go
through the entire 802.1x authentication process again, ensuring minimal latency in data connectivity
during roaming. The default roaming time value is 100 ms and the valid range is 1 - 600000 ms.
l Opportunistic Key Caching Roams (okc) – This feature enables swift roaming of wireless clients to APs
that it has never associated with earlier, without any requisite pre-authentication. When an AP successfully
completes the 802.1x authentication and associates with a wireless client, it stores a unique PMK
associated with that client. This per client PMK is advertised to and stored by all the APs in that particular
network. When a client roams, it associates with a new AP based on this cached PMK, without any pre-
authentication. This reduces the latency caused during roaming by eliminating the re-authentication
process. The default roaming time value is 100 ms and the valid range is 1 - 600000 ms.
FortiAIOps dynamically determines the optimal roaming time for each type of roaming for a specific AP-Client
environment using machine learning algorithms.
Device Health
Configure AP, switch, and FortiExtender health SLA threshold values. The AP health is displayed in the AP
Health and Uptime SLA of the Wireless section, the switch health is displayed in the Switch Health and Uptime
SLA of the Switching section, and the FortiExtender health is displayed in the FortiExtender Health SLA of the
WAN section.
Navigate to AI Insights > SLA configuration > Device Health to configure the following parameters.
l CPU usage
l Memory usage
l Temperature
The default value for the CPU and memory parameters is 80% and the default value for the temperature is 45
degree Celsius.
Inventory
This section describes adding the FortiGate controllers to FortiAIOps, grouping them, and the management
operations on the added controllers.
l Adding and Managing FortiGates
l Device Groups
l VDOM Support
This page provides a graphical representation of the FortiGate controllers deployed in your network. You can
view and monitor the current status of the FortiGate controllers, the various FortiGate models in use, and the OS
versions. The table beneath the charts provides the details of all FortiGate controllers; click on specific areas of
the chart to filter data displayed in the table.
Adding a FortiGate
The communication between the FortiAIOps application and FortiGate is secured by SSL/TLS encryption.
Therefore, FortiAIOps can successfully discover a FortiGate only if a valid certificate is installed in FortiGate.
However, FortiAIOps can also discover FortiGates with a default certificate over a trusted connection. If a 3rd
party certificate is installed in FortiGate for HTTPS/web server then the corresponding CA certificate should be
Installed in FortiAIOps for successful discovery. For more information see Certificates and FortiGate
Certificates.
The managed FortiGate IP address/FQDN configured in FortiAIOps must match the Subject Alternative Name
(SAN) in the FortiGate certificate, else, the FortiGate discovery fails.
l If the FortiGate IP address is configured in FortiAIOps then the SAN attribute in the certificate should be the
FortiGate IP address.
l If the FortiGate FQDN is configured in FortiAIOps then the SAN attribute is the certificate should be the
FortiGate FQDN.
l If the FortiGate IP address or FQDN are configured in FortiAIOps then the SAN attribute in the certificate
should include both the FortiGate IP address and FQDN.
Notes:
l FortiGate discovery fails if a certificate is from an unknown authority. Ensure to install specific CA certificate
of FortiGate in FortiAIOps.
l If a new certificate is installed in a managed FortiGate then Fortinet recommends to re-add the FortiGate in
FortiAIOps.
l For self-signed CA certificates generated in FortiGate, valid CA certificate should be installed in
FortiAIOps.
l To use a Let's Encrypt certificate, ensure to download and install the CA certificate of Let's Encrypt in
FortiAIOps. For more information see Automated Certificate Management Environment (ACME).
To manually add a FortiGate controller, click Add and provide the following details.
You can import details of FortiGate controllers from a .csv file to add them. Enter the details in the format
depicted in the image here.
You can download a sample template for populating the FortiGate details, from the Actions drop-down menu.
Managing FortiGates
This page provides analytical information related to the performance of various elements and processes in your
network. The data is visually represented with interactive options to drill-down and filter specific information.
This enables monitoring, diagnostic, and troubleshooting operations for connectivity issues, data usage, and
enhancing performance.
You can perform the following operations on a FortiGate controller listed on this page.
l Reboot - Select a FortiGate controller to reboot and click Reboot.
l CLI - Select a FortiGate controller and select CLI to access the CLI interface.
l Edit and Delete - Select a FortiGate controller and click Edit (to update configuration) or Delete (to
remove the FortiGate).
l View Details - Select a FortiGate for Diagnostics and tools. This pane displays details about the
selected FortiGate and also provides diagnostic tools for your network.
To view details of the HA cluster, click on the icon in the FortiGate Name column.
Performance
This tab displays the performance data for your network based on various parameters. You can filter the trends
based on the selected duration or customized time slot; select a time window or define a Custom range. The
custom range allows the selection of a minimum of 1 day and the maximum is the duration of log retention
configured in System > Settings. The data in this tab is automatically refreshed every 60 seconds; the
following options are available to manage the auto-refresh feature for this page.
l
Click to manually refresh data.
l
Click to pause the auto-refresh.
l Click to resume the auto-refresh.
Environmental
This tab displays resource usage such as, the maximum CPU and memory usage levels, and the maximum
number of sessions at a given time.
Hover over each of these graphs to view the current statistics and click on any of these graphs to view details.
Wireless
Displays detailed information about the health of the wireless connections in the network, such as, loss%, SNR,
channel utilization %, number of stations, status of the FortiAPs, low signal stations, the average throughput at a
given time, and the number of rogue APs at a given time.
Hover over each of these graphs to view the current statistics and click on any of these graphs to view details.
Clients
This tab displays information about the clients connected to the network, such as, throughput, Loss (%), Retries
(%), and SNR (dB) and throughput.
Hover over each of these graphs to view the current statistics and click on any of these graphs to view details.
Channel Summary
This page provides granular insights into the performance of each channel with detailed statistics and trends.
For more information, see Channel Summary.
FortiAPs
This tab displays details about the selected access point with their status and details. To view the details, select
an access point and click View Details. For more information on the diagnostic options and details see Access
Points.
Clients
This tab displays the clients currently connected to the selected access point along with their details. To view
the details, select a client and click View Details. For more information on the diagnostic options and details
see Clients on page 160.
FortiSwitch
This tab displays a graphical snapshot of the FortiSwitch activity such as, the total number of FortiSwitches,
their status (online/offline), and the deployed model details. To view the details, select a FortiSwitch and click
View Details. For more information on the diagnostic options and details see FortiSwitch.
Logs
This tab displays the detailed FortiGate event logs and each event is assigned a severity, that is depicted with a
color code. Hover over the color bar in the Level column to view the severity.
l General - Generic information about the log event such as, the date and time of event logging, the
associated virtual domain, and the log description.
l Source - The details of the associated access point such as the MAC address, interface, and SSID.
Tools
FortiAIOps provides various utilities that you can run on the FortiAP for Connectivity Analysis, Network
Analysis, and Enhanced Troubleshooting.
l Packet Capture
l ARP Table
l Routing Table
l DHCP
l DNS Lookup
l Reverse DNS Lookup
l Web CLI
l TAC Report
l Process Monitor
Packet Capture
You can use the packet capture tool to select a packet and view its header and payload information in real-time.
Once completed, packets can be filtered by various fields or through the search bar. The capture can be saved
as a PCAP file that you can use with a third-party application, such as Wireshark, for further analysis.
Click Run and select the Interface and the Maximum captured packets (default is 10). You can enable filters,
for a Basic filter, provide the Host, Port, and Protocol Number and for an Advanced filter, enter a string, such
as src host 172.16.200.254 and dst host 172.16.200.1 and dst port 443. Click Start capture.
ARP Table
The ARP Table records the discovered MAC address - IP address pairs of devices connected to a network and
the interface details. Each connected device has its own ARP table that stores the MAC-IP address pairs that
the device has communicated with. Click Run to view the ARP table.
Routing Table
You can view the routing table on the FortiGate, including all static and dynamic routing protocols.
DHCP
The DHCP monitor shows all the addresses leased out by FortiGate's DHCP servers.
DNS Lookup
Enter the domain name (FQDN) to view the IP addresses associated with it.
Enter the IP address to view the domain name (FQDN) associated with it.
Web CLI
TAC Report
The Technical Assistance Center (TAC) report runs an exhaustive series of diagnostic commands for
troubleshooting network issues. You are required to download the generated report (.txt) to view it; click
Download report.
Process Monitor
The process monitor displays running processes with their CPU and memory usage levels. You can sort, filter,
and terminate processes within the process monitor pane.
Device Groups
You can group FortiGate controllers for ease of management. Each controller can belong to only one group; if a
controller is added to a second group, it is automatically removed from the previous group. Device groups allow
administrators to manage devices in a certain way, such as, provide specific access to a set of devices. The
admin user have access to all the device groups and devices within them. System administrators and users
assigned the super user role can only create and configure device groups.
If you do not set up device groups, all controllers remain assigned to the Default device group.
1. Navigate to Device Groups and click Add.
2. Provide a unique Device Group Name and an optional Description.
3. A list of controllers managed by FortiAIOps is displayed. Select from the listed controllers and click Create.
The controllers are added to the device group.
You can switch the device group from the bar on the top-right of the GUI; click Device Group and select the
available group. To add a FortiGate controller to an existing device group or move a FortiGate to a different
group, select the device group where you want to add/move the FortiGate to and click Edit. The FortiGate
controllers are listed, select the FortiGate you want to add to this group and click Update.
VDOM Support
VDOMs are used to divide a FortiGate into two or more virtual units that function independently. VDOMs can
provide separate security policies and, in NAT mode, completely separate configurations for routing and VPN
services for each connected network. When a FortiGate is in multi-VDOM mode, a VDOM can be configured as
an Admin, Traffic, or LAN extension type VDOM. For more information to add a VDOM, see Virtual Domains.
Wireless
The Wireless section of the FortiAIOps provides a comprehensive set of tools for managing and monitoring
wireless networks.
l Access Points
l Clients
l Channel Summary
l Applications
l Location Services Monitor
l Heat Maps
l Rogue APs
l Map Management
Access Points
The Access Points page displays essential information about the APs in use and consists of two views - AP and
Radio view. To switch between the AP and Radio views, select the desired view from the dropdown menu
located at the middle of the Access Points page. By default, the AP is displayed when the page loads.
l AP
l Radio
l Diagnostics and Tools
AP
The AP view displays information related to the Access Point and consists of three widgets - FortiAP status,
Channel Utilization, and FortiAP model.
FortiAP Status
The FortiAP Status widget provides information about the status of each AP listed on the page. It displays the
current status of the AP, which can be either Online, Offline or Unauthorized.
Band
The band widget provides the number of channels for the 2.4GHz, 5GHz and 6GHz bands. Hovering over the
chart displays the number of APs in that band and the percentage of the total channels that they comprise of.
FortiAP Model
The FortiAP Model widget displays the model number of each AP listed on the page. It provides information
about the hardware model of the AP and its associated count. This widget is useful for identifying the different
models of APs being used in the network.
Note: Click the donut chart in the widgets, to filter the AP table. To reset the filter, click the widget name.
The APs are listed with their relevant details, including the AP name, FortiGate, FortiAP status, SSID , channel,
clients, OS version, FortiAP profile and license. To view detailed information about an AP, select the desired AP
from the list and click View Details. See, Diagnostics and Tools.
Right-click on the header of the table to select the desired columns to add to the table, and then click Apply to
update the table with the selected columns.
To reset the table to its default state, click Reset button. Click Best Fit Columns to automatically adjust the
column width to fit the data displayed in the table.
To filter the AP list based on the column data, click the filter icon in the column header next to the title, select the
value to be filtered and click Apply.
Type in the search term in the search bar located at the top of the AP list. The search term can be a specific AP
name, client name, or any other relevant information.
Click the plus icon located to the left of the search bar to perform a more specific search based on a particular
column. Select the desired column, and then enter the search term to narrow down the search results to specific
criteria.
Radio
The Radio view displays information related to the radios in the AP and consists of three widgets - Status, Type
and Channel.
Status
The Status widget displays the current status of each radio, either Online or Offline.
Type
The Type widget displays the type of each radio, such as 802.11a/n/ac or 802.11b/g/n, 802.11ax, 802.11ax-6G,
or unknown. This information is useful for identifying the capabilities and features of each radio within the AP.
Channel
The Channel widget displays the channel being used by each radio. This information is important for optimizing
the network's performance and minimizing interference between radios within the AP.
The radios are listed with their relevant details, including the AP name,AP serial number, FortiGate, FortiAP
status, SSID , channel, No of clients, FortiAP profile, Band , Type, Radio ID, AP mode, Channel Utilization and
license.
To view detailed information about an AP, select the desired AP from the list and click View Details. See,
Diagnostics and Tools.
Right-click on the header of the table to select the desired columns to add to the table, and then click Apply to
update the table with the selected columns.
To reset the table to its default state, click Reset button. Click Best Fit Columns to automatically adjust the
column width to fit the data displayed in the table.
To filter the AP list based on the column data, click the filter icon in the column header next to the title, select the
value to be filtered and click Apply.
Type in the search term in the search bar located at the top of the AP list. The search term can be a specific AP
name, client name, or any other relevant information.
Click the plus icon located to the left of the search bar to perform a more specific search based on a particular
column. Select the desired column, and then enter the search term to narrow down the search results to specific
criteria.
The Diagnostics and Tools pane displays the details about the selected Access Point/Radio and allows you to
run diagnostic tests.
l Performance
l Channel Summary
l Clients
l Interfering SSIDs
l Logs
l Spectrum Analysis
l VLAN Probe
Performance
The performance tab displays trends for the FortiAP health, wireless, and wired clients for selected interval.You
can filter the trends based on the selected duration or customized time slot; select a time window or define a
custom range. The custom range allows the selection of a minimum of 1 day and the maximum is the duration of
log retention configured in System > Settings. The minimum, maximum, and average values are displayed
when a time interval of more than 6 hours is selected.
AP Health
This tab monitors and displays the CPU and memory usage by the FortiAP over the selected time interval. At
any given point in time, you can view the maximum, minimum, and average CPU and memory usage. This tab
also displays the operating temperature of the FortiAP collected by various sensors. The temperatures recorded
by all sensors are displayed.
Wireless
It includes charts for clients, bandwidth, channel utilization, transmission discard, retries, and noise levels on the
respective radio interface. The default interval is 10 minutes and can it be changed according to your
requirements.
The minimum, maximum, and average values are displayed in the Bandwidth, Transmission and Noise
panels when the selected time interval is more than 6 hours, as depicted in the following image.
Click on the graphs for a specific time to view details. The following image depicts the details displayed for an
interval of less than 6 hours.
The following image depicts the details displayed for an interval of more than 6 hours.
Wired
The LAN port statistics are now displayed for access points. You can view the traffic coming into a LAN port and
the traffic leaving it at a given point in time. Also, the error statistics for both incoming and outgoing traffic is
displayed.
Note: The LAN port status is not displayed for FAP-421E and FAP-423E.
Clients
The Clients tab helps you monitor your network, based on the retries percentage, SNR, and client distribution.
This data is displayed per OS for the selected time interval.
l Retries
l SNR
l Clients
Retries
The statistics for retries are categorized as good, fair, and poor based on the following criteria.
l Good - Retries are less than 30%
l Fair - Retries are between 31% - 70%
l Poor - Retries are more than 70%
SNR
The statistics for SNR are categorized as good, fair, and poor based on the following criteria.
l Good – SNR is equal to or greater than 25 dB
l Fair – SNR between 15 and 24 dB
Clients
This panel provides the total number of clients and also the number of clients associated with each OS type.
Hover over the graph or the OS name to view details.
To view details for each of the 3 panels, click on the retries and SNR graphs, or on the OS name to view details.
The Details page displays data such as, the host name, access point and radio details, associated SSID, OS
type, throughput, noise, retries, and so on.
Channel Summary
This page provides granular insights into the performance of each channel with detailed statistics and trends.
For more information, see Channel Summary.
Clients
The Clients tab displays a list of clients currently connected to the selected AP, along with details such as the
client MAC address, FortiGate and IP Address, FortiAP name , associated SSID, user name , operating channel
and the radio details, Tx and Rx bandwidth, signal strength and noise, VLAN ID, RF band, the wireless
standard, and the time of association. This information is useful for identifying any clients that may be
experiencing connectivity issues or data usage problems. To view detailed information of a client, select the
client and click View details.
Interfering SSIDs
The Interfering SSIDs tab displays the details of interfering SSIDs associated with an AP; the interfering SSID
page displays the associated SSID, related AP BSSID, operating channel, signal strength and the radio details
are displayed in the AP dashboard. To view the interfering SSID details, ensure that the AP radio is using Radio
Resource Provisioning or a WIDS profile in FortiGate (Managed FortiAP Profile).
Logs
The Logs tab provides detailed logs of events related to the selected AP/Radio. To view detailed information,
select log and click Details.
Spectrum Analysis
Spectrum Analysis tab provides visual spectrum analysis capabilities that scan radios for RF channel conditions
and sources of interference which can potentially impact WLAN efficiency. Based on the spectrum analysis
data, corrective measures such as determining optimal channel planning, debugging client related connectivity
issues and automatic transmit power settings are initiated. This facilitates quality wireless service levels by
ensuring the optimal usage of the channels considering the information provided by the FortiAIOps spectrum
analyser. Both 802.11 and non-802.11 sources of interference can be detected and analyzed by the spectrum
analyzer.
Notes:
l Spectrum analysis is supported for all channels when the radio is in the dedicated monitor mode, and for
selected channels when the radio is in the AP mode.
l FortiAP supports spectrum analysis and is online.
Select the channels to be scanned and configure the scan duration, the spectrum analysis is performed on 2.4
GHz, 5 GHz, and 6 GHZ frequency bands. The spectrum analyzer result displays widgets with the type of
interference, signal strength, impacted channels, and wireless spectrum current utilization, start and end time
and duration of the interference. It classifies wireless & non-wireless interferences to easy identification of the
source.
l You can select the AP, Radio, and Channels to be scanned for interferences.
l The Scan Duration can be set to 1, 5, 30, or 60 minutes.
l The Sampling Interval and the number of Spectrogram Samples cannot be modified.
Select Start and the GUI periodically polls the spectrum analysis data based on the fixed sampling interval of
1000 milliseconds. Data is visualized as 4 charts representing signal interference marking the noise levels for
each channel, signal interference spectrogram representing 60 samples for different channels at specific time
intervals, the duty cycle charts marking the extent to which a non-WiFi device/neighbouring AP is interfering,
and the duty cycle spectrogram representing 60 such duty samples for each channel over a period of time.
The tabular data for non-WiFi interference displays the time and frequency of last detection and any of the
following type of devices causing the interference.
l Microwave ovens
l Video bridges
l Wi-Fi, DSSS cordless phones
l Bluetooth, FHSS cordless phones
The tabular data for WiFi interference displays the online neighbouring AP's BSSID, SSID, maximum signal
strength, and channel and time of last detection.
VLAN Probe
VLAN probe tab enables FortiAPs to probe connected VLANs and subnets. It sends DHCP probes from the
FortiAP’s Ethernet interface to specific VLANs on the wired interface and returns information on their availability
and subnet details. This helps diagnose and troubleshoot WiFi deployment issues.
l Probe Retries – Configure the number of retries before timeout. The valid range is 1 to 10 with a default
value of 6.
l Timeout – Configure the timeout for the VLAN probe. The valid range is 1 – 60 seconds with a default
value of 10 seconds.
l VLAN Range – Select the range of VLANs to probe. The valid range is 1 - 4094.
Select Start to initiate VLAN probe as per configurations.
Clients
The Clients page provides information about the clients connected to the wireless network and consists of three
widgets - signal strength, band, and technology.
l You can filter the wireless client data for a selected duration or a customized time slot.The Custom range
allows the selection of a minimum of 1 hour and maximum of 1 week, the option of Now displays data for
the last 1 minute.
l You can export data in a .csv file, click on the export icon on these pages.
Signal Strength
The signal strength widget provides information about the strength of the signal between each client and the
access point. It displays the signal strength in dBm, which is a measure of signal power. A higher dBm value
indicates a stronger signal, while a lower dBm value indicates a weaker signal.
Band
The band widget displays the band that each client is connected to. It indicates whether the client is connected
to the 2.4 GHz, 5 GHz or 6 GHz band.
Technology
The technology widget displays the technology that each client is using to connect to the wireless network. It
indicates whether the client is using 802.11a/b/g/n or 802.11ac technology.
The clients are listed with their relevant details, including the MAC address, FortiGate, IP address, FortiAP,
SSID, channel, bandwidth, and signal strength. To view detailed information about a client, select the desired
client from the list and click View Details. See, Clients Diagnostics and Tools.
You can export data in a .csv file, click on the export icon on these pages - .
Right-click on the header of the table to select the desired columns to add to the table, and then click Apply to
update the table with the selected columns.
The Diagnostics and Tools pane displays the details about the selected Client and allows you to run diagnostic
tests.
l Performance
l Applications
l Destinations
l Policies
l Logs
Performance
The Performance tab displays information about the client's performance, including data charts for bandwidth,
signal strength, and transmission discards and retries. You can filter the trends based on the selected duration
or customized time slot; select a time window or define a Custom range. The custom range allows the selection
of a minimum of 1 day and the maximum is the duration of log retention configured in System > Settings.
Applications
The Applications tab displays a list of applications in use by the selected client, along with details such as the
application name, category, risk, data usage, session and bandwidth details.
Destinations
The Destinations tab displays a list of network destinations accessed by the selected client, along with details
such as the destination IP address, application name, data usage, session and bandwidth details.
Policies
The Policies tab displays information about any policies applied to the selected client, such as policy name,
policy type, source interface, destination interface, data usage, session and bandwidth details.
Logs
The Logs tab displays detailed logs of events related to the selected client, allowing you to troubleshoot any
issues. To view detailed information, select log and click Details.
Channel Summary
This page provides granular insights into the performance of each channel with key insights into critical
statistics, that are key in determining the health of your wireless network. This facilitates effective resolution of
any potential network stability issues due to the operating channel. FortiAIOps retrieves and aggregates all
channel related statistics from the FortiAPs operating in your network and multiple radios operating on various
channels.
Note: All data and trends displayed on this page are for the last 1 minute.
You can filter based on specific deployment locations such as Site, Building, and Floor.
Band
This chart provides channel count based on RF bands of 5 GHz, 2.4 GHz, and 6 GHz. The total number of
channels for each band are displayed along with what percentage of the total channels used by the wireless
network they comprise of. Click on any band to filter channel details and view them in the table below the charts.
This chart provides the channel count based on the average utilization severity over the last 60 seconds.
FortiAIOps automatically categorizes the channels as Good or Poor, and Fair. The total number of channels for
each severity are displayed along with what percentage of the total channels used by the wireless network they
comprise of. Click on any severity to filter channel details and view them in the table below the charts.
This chart provides the channel count based on the average interfering SSID severity over the last 60 seconds.
FortiAIOps automatically categorizes the channels as Good or Poor, and Fair. The total number of channels for
each severity are displayed along with what percentage of the total channels used by the wireless network they
comprise of. Click on any severity to filter channel details and view them in the table below the charts.
The channel data in the tabular format categorizes channels based on the RF band. To view radio level details
for a particular channel number, select it and click View details.
Field Description
FortiGate Name and AP The names of the FortiGate controller and FortiAP associated with the
Name selected channel.
Field Description
Interfering SSID Severity The average interfering SSID severity of the selected channel.
Health Assessment FortiAIOps evaluates a assigns the health status of each radio.
To view trends and patterns to assess the performance of specific channels, select a channel and click Trends.
You can view a graphical representation of the channel statistics over a period of time. These trends can be
filtered for the last 10 minutes, 1 hour, or 12 hours. Hover over the charts or click on a them to view the related
statistics at a specific time. For example, the following image depicts a maximum channel utilization of 95% with
the time stamp, clicking on this point provides similar data in a tabular format. You can filter the trends based on
the selected duration or customized time slot; select a time window or define a Custom range. The custom
range allows the selection of a minimum of 1 day and the maximum is the duration of log retention configured in
System > Settings. The minimum, maximum, and average values are displayed when a time interval of more
than 6 hours is selected.
Applications
The Applications page provides information about the applications used by clients on the wireless network. This
page consists of three widgets - Apps by usage, Apps by risk, and Users by usage.
Apps by usage
The Apps by Usage widget displays a list of applications in use on the network, sorted by the amount of data
each application is using.
Click on the trends icon to view the application usage trends. You can filter the trends based on the
selected duration or customized time slot; select a time window or define a Custom range. The custom range
allows the selection of a minimum of 1 day and the maximum is the duration of log retention configured in
System > Settings.
Apps by risk
The Apps by Risk widget displays a list of applications in use on the network, sorted by their risk level.
User by usage
The User by usage widget displays a list of clients on the network, sorted by the amount of data each client is
using.
Click on the trends icon to view the application user trends. You can filter the trends based on the selected
duration or customized time slot; select a time window or define a Custom range. The custom range allows the
selection of a minimum of 1 day and the maximum is the duration of log retention configured in System >
Settings.
The Location Services Monitor page plots the current location of all stations and rogue APs on the floor map
imported into FortiAIOps. FortiAIOps plots the current location based on the location feed received from
FortiGates (which are in turn connected to APs) and does not display the movement of the stations.
You can filter and view device locations based on the site, building, and floor. The following filters can be
applied.
l Device Type
l Wireless Type
l OS Type
l Station/BLE MAC
l Accuracy
l Rogue MAC
You can set the Floor Visibility and magnify the floor view.
Select Wireless Station as the Device Type, to view the stations location.
Click Connected Stations toggle to switch to Connected & Discovered Stations view.
Heat Maps
The heat map allows you to verify the coverage and performance of your WLAN APs. You can also use the
maps to visually locate APs sending alarms. Use the map editor to set up your site maps.
l In the Network Heat Maps screen, select a Location from the menu on the left to see the corresponding
map.
l Hover the mouse pointer over the objects on the screen to see details. For example, for this throughput
map, by hovering the mouse pointer on an AP icon displays the Name, model, Mac Address, status of the
AP and throughput value. If you change the Heat Map Type, be sure to click Refresh icon.
l In the Network Heat Maps screen select a floor. The following five types of heat maps can be viewed.
Throughput maps display the AP throughput over the represented area. The APs on the map are differentiated
by using different colors to represent the corresponding AP throughput value.
Hover over AP to view the AP information including name, AP model, MAC address, AP status, and throughput
in Kbps.
To view AP and Station details in any of the heat maps, right-click an AP icon and click Show Details
l AP Details: AP ID, AP Name, AP MAC Address, AP IP Address, Controller, Total Stations.
l Station Details: MAC Address, IP Address, Last Known Association, User Name, Throughput, Loss%,
RSSI, Airtime Utilization, L2 State, L3 State.
l To view Station Trend Dashboard, click MAC Address.
The filtering option comprises of All, 2.4 GHz [default], 5 GHz, 6 GHz and selected channels within the three
bands.
Loss maps show the AP loss over the represented area. The APs on the map are differentiated by using
different colors to represent the corresponding AP Loss% value.
Hover over AP to view the AP information including name, AP model, MAC address, AP status, and loss %.
Right click on AP icon and click Show Details to view detailed information.
The Channel Utilization maps differentiate APs on the map by using different colors for the regions around APs
corresponding to the AP channel utilization value.
Hover over AP to view the AP information including name, AP model, MAC address, AP status, and channel
utilization (%). Right click on AP icon and click Show Details to view detailed information.
The Number of Stations Heat Map, represents the low signals over the area represented by the map. The
Number of Stations maps differentiate APs on the map by using different colors for the regions around APs
corresponding to the number of stations per AP.
Hover over AP to view the AP information including name, AP model, MAC address, AP status, and number of
stations.
Signal strength heat map provides a distribution of signal quality over the floor map. The signal strength is
represented in dBm and is divided into color buckets. The Signal Strength maps display the availability of signal
over the area represented by the map. Select different cut-off values to view the signal coverage.
Note: The signal strength heat map allows you to view the signals of all the APs on the floor. Due to this, the
FortiAIOps displays heat map for all APs irrespective of whether the logged in user has scope for those APs or
not. This enables you to capture accurate signal value for all APs located on the floor.
Hover over AP to view the AP information including name, AP model, MAC address, AP status, and signal
strength.
With signal strength heat map having smooth transition in colors, the color at a given point may not exactly
match with the bucket colors. For such cases, it should be interpreted as a value that is greater/lower than the
nearest bucket color.
Coverage Cut Off: Coverage cutoff [default being none] can be used to see the signal coverage region within
the cutoff value specified. The cutoff range is from -42dBM to -90dBM.
To view the signal strength heat map of a floor, follow these steps:
l Ensure that the APs are placed accurately through the map management feature.
l Click on Heat maps and select the desired floor.
l Select the RF band or relevant channel from the menu.
l Choose a cutoff of interest.
l Click on the Refresh icon.
Rogue APs
The Rogue APs page provides detailed information about rogue access points (APs) on the wireless network
and consists of three widgets - Interfering APs, SSID, and Vendor Info.
Interfering APs
The Interfering APs widget displays the number of rogue APs detected by each managed FortiAP unit or
FortiWiFi local radio.
SSID
The SSID widget displays the number of SSID names detected as rogue APs.
Vendor Info
The Vendor Info widget displays the vendor information for each rogue AP detected on the network.
The Rogue AP list provides detailed information about each rogue AP detected on the network, including the
MAC address, SSID, state, signal interference, and vendor information.
Map Management
Map management allows you to create visual representations of your access points (APs) to accurately
represent the physical layout of a site. For best results, create separate maps for each floor in multi-level
buildings, and use accurate architectural drawings as a basis for your images. Crop each floor map to remove
extra space and save it as a PNG, JPEG, BMP, or GIF file no larger than 2MB before adding it to FortiAIOps.
Note: Provide a unique name to the site/building/floor plan. Do not use the same name across different device
groups.
To set up a working map, you'll need to complete several tasks:
l Import a graphic map of the floor. See Importing a Map Image.
l Add a new site to FortiAIOps. See Add a Campus, Building, and Floor to the Map.
l Add a building.
l Add a floor.
l Place AP icons on the map to represent the WLAN network topology. See Add APs, Floor APs, and Landmarks to Maps.
l View the map. See Viewing Maps.
FortiAIOps supports importing a floor map plan created on and exported from the FortiPlanner. Once the floor
plan is created in the FortiPlanner, select Export in the project menu. The floor map to be imported is a .zip file.
Note:Only exported .zip files from the FortiPlanner can be imported. Contact the Customer Support to obtain
the relevant version of the FortiPlanner. For more information on creating floor plans on the FortiPlanner, see
the FortiPlanner User Guide.
1. Navigate to Wireless>Map Management page.
2. Click Import, the Import Map Plan screen is displayed.
3. Browse to the .zip file on your system and click Next. A summary of map information is displayed.
4. Map the unassigned APs and click Finish.
5. The planner for each site is displayed. On the Map Management screen, you can add and delete floors in
the map and manage the APs on each floor of the site.
In case of errors importing the map, click View Latest Import Planner logs, to view the error logs.
You can perform the following operations on each floor:
l Add APs - Select the APs to be added to the floor map.
l Floor APs - Select the APs to be deleted from the floor map.
l Landmarks - Add or delete landmarks on the floor map.
l Change Image - Upload a new image or delete an existing image from the floor map.
Click Save to save changes to the map
To create a new location (site, building, floor) in the enterprise, follow these steps:
1. Navigate to Wireless > Map Management page. All current maps are displayed on the Map Management
page.
2. To add a new site, click on the Site Details section and then click on Add. A new site can only be added to
the top level, Enterprise, which is the default.
11. Provide a floor name, length, width, metric, and sort order for the floor.
12. Click Save Changes.
Editing AP Details
Viewing Maps
You can view the placement of APs on a map or view Heat Maps that show the following five attributes of those
APs:
l Throughput
l Loss
l Channel Utilization
l Number of Stations
l Signal Strength
Heat map coloring depends on the distance between APs and selected attribute (throughput, loss, channel
utilization, or stations) for all the APs on the floor. If there is only one AP on the floor, the entire floor will show the
same coverage. See Heat Maps.
To view maps and heat maps, follow these steps:
RF Planner
The RF planner is a tool that enables you to plan for new access points, areas, and obstacles (walls, shafts,
etc.). It allows you to place APs and draw walls or columns in both View and Edit modes.
View Mode: In View mode, the floor map displays the coverage pattern, data rate, channel, and signal strength
of the access points. You can select the 2.4GHz, 5GHz, or 6GHz frequency to view the access point details.
Edit Mode: In Edit mode, you can add or edit new access points. To do this, drag the required access point from
the "Add APs" panel and place it on the floor map. Right-click on an access point and edit its configuration, such
as the access point transmission power in dBm, channel, orientation, placement direction (in angles), ceiling,
wall, and desk.
To draw walls and columns on the floor map, use the provided widgets. Select the required widget and draw the
wall or column on the map. A column is a closed drawing with four walls, while a wall is demarcated as lines.
Right-click on the created walls and columns to specify the composition or material used to construct them.
Each material has a different attenuation value.
Switch
This section describes the FortiSwitch statistics and the FortiSwitch client details.
l FortiSwitch
l FortiSwitch Clients
FortiSwitch
You can monitor the FortiSwitches in your network that are in the purview of FortiAIOps. This page displays a
graphical snapshot of the FortiSwitch activity such as, the total number of FortiSwitches, their status
(online/offline/unauthorized), and the deployed model details.
To view the FortiSwitch statistics and diagnostics in detail, select a row and click View Details. The Status
including the FortiSwitch face plate, hardware summary, general status and statistics, and configuration details
is displayed.
l Ports
l Cable Test
l Logs
l Statistics
l Clients
Ports
This tab displays each port details of the specific FortiSwitch unit.
Parameter Description
Port The name of the port (red for port down, green for port up)
Cable Test
This is a diagnostic and troubleshooting tool to check the state of cables between the FortiSwitch and the
devices connected to its physical ports. This tool does not work on fiber ports and on very short or very long
cables (more than 100 meters).
All available external physical ports of the FortiSwitch are displayed. Select one or more ports and click
Diagnose.
Note: Running the cable diagnostic test on a port disables it briefly. The network traffic is affected for a few
seconds.
Logs
This tab displays the FortiSwitch log messages and the associated details.
Parameter Description
l Alert (orange)
l Error, Warning (blue)
l Notice, Information, Debug (green)
FortiGate Serial Number The serial number of the associated FortiGate controller.
Relative Date/Time The time lapsed since the event log was generated.
Select a log message and click Details to view specific related information. This view provides the following
information.
l General - Generic information about the log event such as, the date and time of event logging, the
associated virtual domain, and the log description.
l Source - The details of the user.
l Message - The generated log message.
l Security - The severity level of the log event.
l Cellular - The serial number of the FortiSwitch.
l Other - Generic information such as the log event time stamp, the timezone, log type, and so on.
Statistics
This tab displays the FortiSwitch and the associated port statistics.
Parameter Description
Parameter Description
Select a particular port and click View Trends to view a graphical representation of the trends in FortiSwitch
statistics over a period of time. You can filter the trends based on the selected duration or customized time slot;
select a time window or define a Custom range not exceeding 6 months. The minimum, maximum, and
average values are displayed when a time interval of more than 6 hours is selected.
The Switch view provides a graphical representation of the trends in FortiSwitch statistics over a period of time.
You can filter the trends based on the selected duration or customized time slot; select a time window or define
a Custom range not exceeding 6 months. The minimum, maximum, and average values are displayed when a
time interval of more than 6 hours is selected.
Clients
This tab displays the details of the FortiSwitch clients. The following information is displayed.
Parameter Description
FortiSwitch Clients
You can monitor the FortiSwitch clients associated with the FortiSwitches deployed in your network. This page
displays a graphical snapshot of client activity such as, the total number of FortiSwitch clients, their status
(online/offline), the client device details, and the associated VLANs. Hovering over the charts provides specific
statistics and clicking on a specific area on the chart filters the data displayed on this page.
l You can filter the switching client data for a selected duration or a customized time slot. The Custom range
allows the selection of a minimum of 1 hour and maximum of 1 week, the option of Now displays data for
the last 1 minute.
l You can export data in a .csv file, click on the export icon on these pages.
Parameter Description
FortiSwitch The host name or serial number of the FortiSwitch that the client is
associated with.
Last Seen The time that the client was last seen online.
Security Fabric
The Security Fabric page represents the topology, that illustrates the logical placement of the wireless service
and the physical placement of hardware devices. The hardware devices include FortiGates, APs, and wireless
clients in your network.
Note: The physical and logical topologies provide wireless client information.
l Physical Topology
l Logical Topology
Physical Topology
The physical topology provides a visualization/illustration of the physical placement of devices, such as,
FortiGate controllers, APs, and clients connected to each radio in your network, in an hierarchical pattern. The
physical topology is representational; you cannot modify the placement of devices on this page.
You can filter and view selective devices in the topology chart, the filter options available are FortiGate
controllers (Devices), FortiAPs (APs), and device OS. You can also enable viewing of online devices only, in
the topology (Show online devices). To apply the filter settings, click Apply Filter.
The devices/OS set in the applied filters are also displayed at the top of the topology page, hover over each of
these to view the complete list.
The collapsible/expandable hierarchy of devices in the physical topology is FortiGate~ FortiAP ~ radio ~
client; each of the devices displayed is click-able to display the next level of hierarchy.
Hover over the device name to obtain additional information. The status of the FortiGate controllers and APs is
marked using a color legend.
l Green: Online and active
l Red: Offline
Logical Topology
The logical topology provides a visualization/illustration of the logical placement of the configured wireless
service, the associated ESS pushed through the wireless service, VLAN (if applicable), and the stations
connected to each ESS in a hierarchical pattern. The logical topology is representational; you cannot perform
any operations on this page.
You can filter and view selective entities, the filter options available are ESS and VLANs. To apply the filter
setttings, click Apply Filter.
The ESS and VLANs set in the applied filters are also displayed at the top of the topology page, hover over each
of these to view the complete list.
The collapsible/expandable hierarchy of entities in the logical topology is wireless service ~ ESS ~ VLAN ~
client; each of the entities displayed is click-able to display the next level of hierarchy.
Note: The physical and logical network topology views differ based on the browser.
This section describes the WiFi and FortiSwitch event logs and the generation of the FortiAIOps reports.
l Event Logs
l Local Logs
l Reports
Event Logs
The FortiAIOps provides a robust logging environment that enables you to monitor, store, and report WiFi
events and FortiSwitch events. The Summary tab displays the top five most frequent events in each type of
event log along with the severity level and the total count. A line chart displays aggregated events by each
severity level. Clicking on a peak in the line chart displays the specific event count for the selected severity level.
Clicking on any event type title opens the Details page for that event type filtered by the selected time span. You
can select the time frame to view the logs from the top-right corner of the GUI.
The Details tab displays individual, detailed log views for event type. By default, all event details are displayed
on this page, you can filter the WiFi Events or FortiSwitch Events data on this page.
Parameter Description
l Alert (orange)
l Error, Warning (blue)
l Notice, Information, Debug (green)
FortiGate Serial Number The serial number of the associated FortiGate controller.
AP Serial Number The serial number of the access point that the client associated with.
Relative Date/Time The time lapsed since the event log was generated.
Select a log message and click Details to view specific related information. This view provides the following
information.
l General - Generic information about the log event such as, the date and time of event logging, the
associated virtual domain, and the log description.
l Source - The details of the log event source such as, MAC address, interface, SSID, and user details.
l Action - The action leading to the event log and the reason.
l Security - The severity of the log event, the configured security mode, and the encryption type.
l Cellular - The serial number of the associated access point.
l Event - The serial number of the access point and the generated log message.
l Other - Generic information such as the log event time stamp, the timezone, log type, and so on.\
Click on a specific FortiSwitch event to view the details.
Local Logs
The local logs that provide key insights into the system, configuration, reports, license, SAM, and mail events.
Navigate to Logs & Reports > Local Logs and select the time interval to access the logs for. The Summary
tab displays the top five most frequent events in each type of event log along with the severity level and the total
count. A line chart displays aggregated events by each severity level. Clicking on a peak in the line chart
displays the specific event count for the selected severity level.
The Details page for that event type filtered by the selected time span. You can select the time frame to view the
logs from the top-right corner of the GUI.
Reports
You can create and view multiple report categories and types on FortiAIOps. Each report displays specific data
based on the configurations and can be viewed or downloaded in multiple formats.
l Creating Reports
l Viewing Reports
l Scheduled Reports
l PCI Reports
Creating Reports
FortiAIOps allows you to define new reports and generate one-time reports. You can select and combine
multiple report categories and the subsequent report types (maximum 5) to generate a single report instead of
generating multiple reports for each category. These are saved as Report Templates and can be scheduled
similar to other reports.
Basic Information
This section allows you to choose a Category of report, Report Type, provide a Name and Report Title.
Station Reports
Category Description
Station RF and Channel Provides the station RF and channel distribution based on the OUI
Distribution (Organizationally Unique Identifier). A graphical summary of the stations
distributed by RF type, stations distributed across 2.4GHz and 5GHz bands
and station density on each channel over time is displayed. The following
details are displayed.
l Graphs - The graphs are of the following types.
Category Description
l Station Density on each Channel Over Time - This graph displays
the station density on each of the channels over time plotted
against the time in weeks.
l Station Distribution Across 2.4 GHz, 5GHz, and 6GHz Bands -
This graph displays the station distribution based on the 2.4GHz,
5GHz, and 6GHz.
l Station Distribution by RF Type - This graph displays the station
distribution based on the RF Type.
l Station RF and Channel Distribution Details - This section provides
each station's OUI, Date/Time (GMT), Station MAC, RF Type, AP
Name, AP Radio, SSID and Channel.
Station Session Details Provides the average station session trend details. A graphical summary of
the station session trend details of throughput, loss, airtime utilization and
noise for a connected station is displayed. The following details are
displayed.
l Graphs - The three types of Station Session Details graphs are
displayed as follows.
l Trend On Throughput - This graph displays the trend of
Throughput for the selected station.
l Trend On Loss - This graph displays the trend of Loss for the
selected station.
l Trend On Airtime Utilization - This graph displays the trend of
Airtime Utilization for the selected station.
l Station Session Details - This section provides each station's
Date/Time, IP4 Address, IP6 Address, Controller, AP ID, SSID, User,
Throughput (Kbps), Loss%, Airtime Utilization% and AP Name.
Top Stations The Top Stations report type generates reports for the busiest stations
based on the Throughput and Airtime Utilization. This report type generates
the top N stations based on the number of bytes transferred and received
and total Rx/Tx. The information includes each station's Station Mac,
Controller, AP Id, SSID, Throughput (Kbps) and Date/Time (GMT).
Unique Stations Provides the unique station details based on all stations connected to a
network within the reporting interval. A graphical summary of the stations
distributed by RF type, stations distributed across 2.4GHz, 5GHz, and
6GHz bands, stations distributed by OUI, stations distributed by device
type, and stations distributed by OS type is displayed. The Unique Station
reports are available to all groups and list stations connected to network
during last 24 hours. The following details are displayed.
l Summary - This section provides the total number of Unique Stations.
Category Description
EAP-AKA Error The EAP-AKA Error type generates a report with details of EAP-AKA errors
associated with specific ESSIDs and on specific stations connected to
network within the reporting interval. The following details are displayed.
l User selected Top 5 EAP-AKA Errors - The top 5 most common EAP-
AKA errors with the number of stations the errors were reported on and
the number of EAP authentication failures for each station.
l User selected Top 5 Station by Errors - The top 5 stations (MAC
addresses) with highest EAP-AKA errors reported and the number of
EAP authentication failures for each station.
l EAP-AKA Errors - The list of EAP-AKA errors within the reporting
interval. The details displayed are, date and time of the error,
associated controller, access point, station MAC address, and the
ESSID, and the error description/reason.
AP Reports
Category Description
Rogue Details The Rogue Details report type generates the report on the individual rogue.
It displays the rogue mobility trend. The trend is plotted against time and
APs detecting the rogue. The data displayed is a Max of hourly data
sample. The following details are displayed.
l Summary - This section provides the details of the selected rogue
Rogue Summary Summarizes the rogue device information on the trend of the number of
rogues reported on a per controller basis, per hour. The rogue APs and
rogue station count is displayed. A graphical summary of the trend on rogue
AP, trend on rogue station, and trend on controllers is displayed. The
following details are displayed.
l Summary - This section provides the details of the total number of
rogues.
Category Description
l Graph - The graphs are of the following types.
l Rogue Trend By Type - The two types of Rogue Trend By Type
graphs are displayed as follows.
l Trend on Rogue Station - This graph displays the trend type
based on the number of rogue Stations.
l Trend On Rogue AP - This graph displays the trend type
based on the number of rogue APs.
l Rogue Trend By Controllers - This graph displays the top 10
controllers with the highest number of rogues.
l New Rogues Detected During Reporting Interval - This section
provides the details of the new rogues detected during reporting
interval. The details are Date/Time, Controller, AP Detecting Rogue,
AP Location, Rogue MAC, Rogue Type and Channel RSSI.
Top Radio The Top Radio report type generates a report displaying all the Top N
Radios based on Station Count, Throughput, and High Loss. The top radio
report type displays the AP Name, Radio, Controller Name, AP Location,
Station and Date/Time (GMT).
Inventory Reports
Category Description
Access Points Inventory This report type generates the AP inventory summary reports for any
access points that are accessible. The following details are displayed.
l Summary - This section provides the total number of Access Points.
Controller Inventory Lists and tracks all the controllers, with its model and software versions on
the network.
l Summary - This section provides the total number of Controllers.
Category Description
Device Availability Lists all the controllers and access points with its availability, uptime and
down time of each of them. This report generates the report for each
Controller and AP. It displays the Device Name, UP Duration, Down
Duration time and Availability(%) for the AP and Controller.
Service Reports
Category Description
Service Usage Summary Provides the service usage summary based on the ESSIDs. A graphical
summary of the top SSIDs based on throughput and number of stations is
displayed.
l Graph - The graphs are of the following types.
Service Usage Trend Provides the service usage trends based on the ESSIDs. A graphical
summary of the top SSIDs based on throughput and number of stations is
displayed.
l Server Usage Trend graphs - These are displayed with a trend of Max,
Category Description
Application Visibility This report provides the top 10 applications and the top 10 users in your
network which allows you to monitor application usage.
l Top 10 applications graph - For each application, it provides total
Category Description
Scope
This section allows you to define the scope of a report by performing the device selection followed by the service
(SSID) selection.
Reporting Interval
These fields depict the time period to be covered by the selected report. These fields are supported for most
report types. When these fields do not appear, the report considers the current status. Select the Schedule
option of the Recurrence section, the following options in the Reporting Interval section is enabled.
Recurrence
This section allows you to select the time of report recurrence. Select the Schedule option and the following get
enabled.
l One Time - Instant report is generated for the selected reporting interval.
l Schedule - This option allows you to define a specific time for report creation. These schedule fields
establish the time that a report runs, independent of the Scope and Reporting Interval.
l Daily - This option allows you to generate daily reports.
l Weekly - This option allows you to generate weekly reports, select this option followed by selecting the day
of the report generation from the Every drop-down list.
l Monthly - This option allows you to generate monthly reports, select this option and enter the day of month;
1-31 is the valid range.
You can save the generated reports in any of the following formats and email the generated reports to the
specified address.
Viewing Reports
This screen displays a list of all the reports that are generated. These reports can be generated in HTML, CSV,
or PDF format. They can be viewed, printed or saved locally.
Scheduled Reports
This page displays a list of current running reports and reports scheduled to run in the future. In case of
recurring reports, the next run time is displayed. To create a new report, click Add.
PCI Reports
You can validate FortiAIOps against specific PCI requirement compliance. To run a compliance test, enable
Run PCI Test. Select the tests to validate FortiAIOps and click Run Test.
After the test is successfully completed, the page is refreshed to show the list of PCI requirements that are
validated. The validation results are marked with green ticks if they are fully validated and in red if the
compliance is not validated or fails. Click Download PDF Report to get a copy of the validation results in PDF
format.
System
The System section includes several pages that offer valuable insights into various aspects of system
management, such as users, user groups, backup and restore, maintenance, licensing, and location services.
l User Management
l Backup and Restore
l Settings
l Upgrade
l Licensing
l FortiGuard
l Location Services
l Network
l Certificates
User Management
The User Management in the System allows you to view the users and configure user groups and provide the
access permissions.
l Users
l User Groups
Users
The FortiAIOps allows administrators to create users, who will subsequently be available in the FortiAIOps
application.
User permissions are indirectly assigned through their membership in user groups. By default, all users are
members of the Default user group. The admin user and all device groups are automatically members of the
Super User user group, and cannot be moved to any other user group. All users must belong to at least one user
group. It is recommended to assign both the device group and users to the user group upon its creation to
ensure that users have access to the assigned device group. If a user is removed from a user group, they will be
moved to the Default user group.
Note: User Management configuration can only be performed by users with the System Administrator and
Super User roles.
Standard_User Read/Write privilege to all configurations and features except system settings .
Super_User/ System Read/Write access across system. All super users will have access to all
Administrator device groups, all devices, all system settings.
l Click Save.
Notes:
l Once you have created users in FortiAIOps, it is necessary to refresh the FortiAIOps application portal in
order for the users list to be updated and displayed in the User Groups page.
l The super user or system administrator can provide device group access to a user by choosing the device
group and the users in the user group option in FortiAIOps application portal. See User Groups.
l The user list for the FortiAIOps CLI and GUI are different.
Select a user and click Edit to modify user information. This includes changing the user's full name, role or
password.
Activating/Deactivating User
Select a user and click Activate/Deactivate to enable or disable the user's ability to log in or access the system.
Deactivated user accounts can be reactivated at any time.
User Groups
The FortiAIOps access assigned to a user group determines what users in that user group can do.
To edit an user group, select an existing user group from the list and click Edit.
To delete an user group, select the user group and click Delete.
The Backup and Restore page provides valuable tools for managing and maintaining backups of the FortiAIOps
configuration and data. This page includes options for taking, uploading, restoring, downloading, and deleting
backups.
Note: This release supports the backup and restore function only for FortiAIOps configuration. CLI
configurations are saved using the execute backup config command and it does not include any
FortiAIOps specific configurations.
Take Backup
The Take Backup function allows you to take a backup of the FortiAIOps configuration and data. This
information can be saved as a file(.tar) and used to restore the configuration and settings at a later time.
Upload
Restore
To restore a backup, select the a backup from the list and click Restore.
Notes:
l When restoring a backup file on a different FortiAIOps machine, it is necessary to configure the latest
FortiAIOps IP address in the FortiGate syslog settings.
l Admin credentials are retained after restoring the backup file.
Download
To download a backup file to your local machine, select the backup file from the list and click Download.
Delete
To delete a backup file, select the backup file from the list and click Delete.
Upgrade
Navigate to System > Upgrade to upload the FortiAIOps image file and upgrade FortiAIOps.
1. Browse to the image file or drag and drop it in the upgrade window. Click Upload.
2. After successfully uploading the file, click Upgrade Now to upgrade FortiAIOps to the uploaded version.
You can also chose to cancel an ongoing upload or delete the uploaded file. To download the log file with the
upgrade status, click Download log file.
Settings
This page provides the following network and server maintenance parameters to be configured.
l Network Settings
l Statistics
l Administration Settings
l OUI Update
l General Logs
l Mail Server
Network Settings
This section allows you to configure various system settings. Click icon to edit the system settings.
The System Time displays the current system time. This setting allows you to select timezone, set time and
configure NTP server.
Notes:
l Both FortiAIOPs and FortiGate must be synchronized with an NTP server.
l Reboot the system (execute reboot command) after the NTP and timezone settings are configured.
Statistics
This section allows you to configure data retention period in FortiAIOps. All monitoring data is stored based on
dynamically allocated or manually configured duration.
l Auto config duration to keep Statistics data - This feature allows FortiAIOps to dynamically configure
the statistics retention period based on daily data accumulation and the available space for maximum data
storage. This is enabled by default for a period of 3 weeks, but based on daily monitoring of the data
accumulation and available space, FortiAIOps automatically adjusts the statistics retention period.
l Duration to keep statistics data - Manually configure the weeks or months to retain and preserve the
statistics data. The permissible range is 1 to 3 weeks or 1 to 6 months. The statistics data older than the
time period specified in this field from the current date, is automatically deleted from the FortiAIOps server.
If the duration configured here requires more than the available space for statistics retention, then
FortiAIOps throws an error.
Notes:
l You are allowed to configuring the statistics retention duration manually only based on the available disk
space.
l The AI Insight statistics are stored for a maximum period of 1 week.
l Post-upgrade, the configured Duration to Keep Statistics Data is retained with Auto config duration to
keep Statistics data enabled. Based on daily analysis, FortiAIOps configures the statistics retention
period automatically.
Administration Settings
You can select and apply a certificate that is generated/imported in System > Certificates and click Apply
Certificate.
OUI Update
This section allows you to view and manage the OUI details.
l Last update time - Displays the date and time of the OUI details updated the last time.
l Parsing status - Displays the status of parsing.
l Automatically update every week - This option when enabled, will allow the system to automatically
update the OUI details every week.
l Upload OUI File - To upload OUI file, click Choose File, browse and select the OUI file, and click Upload.
General Logs
You can now configure forwarding FortiAIOps local logs to a remote machine. Enable Syslog logging and
enter the IP address/FQDN of remote machine where logs are to be stored.
Note: If the configured syslog server IP address/FQDN is incorrect or not reachable, then the syslog messages
are not logged.
Mail Server
You can configure the SMTP server to receive email notifications for report generation.
Licensing
The licensing page displays the license information including the current license status, expiration date, and the
number of Monitoring, Analytics and SD WAN licenses.
l Monitoring - displays the number of license consumed for monitoring and the number of switches or APs
that are unlicensed. The doughnut chart shows the count of FortiGates that are licensed, partially licensed
and unlicensed. Click on the filters to view license information in detail. For monitoring license, the
consumption is based on the number of switches or APs added.
l Analytics - displays the number of license consumed for analytics and the number of switches or APs that
are unlicensed. The doughnut chart shows the count of FortiGates that are licensed, partially licensed and
unlicensed. Click on the filters to view license information in detail. For analytics license, the consumption is
based on the number of switches or APs added.
l SD WAN - displays the number of license consumed for SD WAN and the number of FortiGates that are
unlicensed. The doughnut chart shows the count of FortiGates that are licensed and unlicensed. Click on
the filters to view license information in detail. For SD WAN license, the consumption is based on the
number of FortiGates added.
Notes:
l If you buy additional licenses or extend the existing ones through FortiCare, the expiration date displayed
will show the nearest expiry and will not include the newly added license. To see the accurate license
details, please check FortiCare portal.
l To purchase a co-term license or add any required extra devices to current licenses, please contact your
distributor or Fortinet renewal team.
FortiGuard
You can enable automatic updates for the FortiGuard Distribution Network (FDN) license, for accurate license
data synchronization. Navigate to System > FortiGuard and enable Scheduled Automatic updates.
FortiAIOps displays the time for the next scheduled update, if you require an immediate update, click Update
License and Definitions Now.
After successfully obtaining the license file from Fortinet, you can upload it on this page. Click Upload License
File.
Location Services
Enable location service on this page and configure the following the FortiAP Profile in your FortiGate. To
configure the location services, you should perform all necessary configurations within FortiGate. However, the
Note: that a minimum of 3 APs must be placed on the map for the locationing service to detect them.
Network
You can configure FortiAIOps with 4 active physical interfaces for VM deployments. The administrators can
configure access protocols like HTTP, HTTPS, and so on, on a per interface basis. Navigate to System >
Network.
Select a port and click Edit to modify the following settings as required.
l Mode - Configure the port IP address mode; Static or DHCP.
l IP Address & Netmask - Enter the IPv4 address and netmask associated with this interface.
l AllowAccess - Select the allowed administrative access protocols from the following.
l SSH
l HTTP
l HTTPS
l Ping
l SNMP
l Telnet
Click Update.
In the Static Routes tab, you can create a default route to your network gateway on the interface that connects
to the gateway. You can create, edit, or delete routes as required.
Certificates
The Certificates page allows you to manage both local and CA certificates. Certificates provide security
assurance validated by a Certificate Authority (CA).
l Local Certificates
l CA Certificates
Local Certificates
The Local Certificates section allows you to install certificate key pair by uploading a zip file containing a
certificate and a private key file. The supported zip file formats include .tar, .tar.gz, tgz, zip, tar.xz, and .xz. Also
you can generate a Certificate Signing Request (CSR).
Server certificates are generated based on a specific CSR. The CSR is a request sent from an applicant to a CA
in order to apply for a digital identity certificate. When a CSR is generated, the associated private key to sign
and/or encrypt connections is also generated. Click on the Generate CSR button and fill in the required
information to generate a CSR for your certificate. In the Certificate Signing Request window, enter the
following.
l Certificate Type - The type of the certificate, either CA signed or self signed.
l Certificate Name - A name for the certificate.
l Common Name - The FQDN or IP address of the server.
l Organization - The name of your establishment or organization.
l Locality - The city or area where your organization is located.
l State or Province - The state or province of the above mentioned area.
l Key Size - Either 2048 or 4096.
l Subject Alternative Name (SAN) - It is mandatory to provide SAN.
l Optionally, you can enter the Organization Unit and the Country.
l Click Generate.
CA Certificates
The CA Certificates section allows you to install and manage your CA certificate. To install a CA certificate, click
Install CA Certificate and upload your CA certificate (.pem or .cer file). You can view details, download, or
delete selected CA certificate after installation.
Notes:
l To upload certificates, the Root CA, server certificate, and key file must be bundled together and uploaded
in any of the supported formats.
l Certificates can only be uploaded in PEM or CER formats. Other formats are not supported. If the
certificate is in any other format, such as P12 or PFX, it must be converted to a supported format before
uploading.
l When using CA2, the intermediate and root CA content must be combined into a single text file (.pem file).
This is necessary because only three files can be included in the bundle uploaded: Root CA, server
certificate, and key file.
l To access FortiAIOps using a custom domain name, you must install the required CA and Server
certificates for the domain configured on FortiAIOps.
Service Assurance
Service Assurance Manager (SAM) is a predictive diagnostic software with trouble-prevention capability. It
diagnosis the health of the wireless network and reports the issue before the users are impacted. The
FortiAIOps infrastructure is used to perform on-demand end-to-end system tests. The SAM mode is activated in
FortiAP during SAM tests. In this mode, FortiAP radios operate as a client and perform tests against another
AP. Once baseline network performance is established, any schedule tests that deviate from the
baseline/threshold are marked based on the SAM test values. Multiple tests can be configured with SAM.
l Connectivity tests to measure packet loss
l Throughput tests to measure performance
The tests can be configured to run on a WPA2 PSK SSIDs available in the FortiGate. SSIDs can only be
configured in FortiGate.
Notes:
l The SAM is supported only for the following.
l F-series, G-series, and K-series FortiAPs. Currently only radio 1 (2.4GHz) and radio 2 (5GHz) are
supported for SAM operations.
l Bridge mode SSIDs
l WPA2 PSK security mode
l Radios in AP mode.
l SAM tests are not supported on radio 3 of the K-series and G-series FortiAP models.
l While running SAM tests, FortiAIOps modifies the FortiAP Profile that is configured on the Access Point in
FortiGate. As a result, the CAPWAP on the FortiAP is restarted.
l Creating a SAM test causes the following changes to your WLAN network, and these changes impact the
clients connected to the FortiAP.
l New FortiAP profiles are created to run the SAM tests.
l Schedule and baseline tests are run immediately.
l Trends
l Results
l Baseline
l Schedule
Trends
The Trends page in the Service Assurance section of FortiAIOps provides a comprehensive overview of
network test performance. You can analyze the total number of tests performed, their categorization as Good,
Fair, or Bad, and gain insights into interface-specific data such as Interface IDs and Maximum Packet Loss
values.
The bar chart classifies the total number of tests performed into three categories: Good, Fair, and Bad. This
classification allows you to quickly assess the overall performance of the network based on the test results.
Each bar represents a specific time period, enabling you to identify trends and patterns in test performance over
time.
If the connectivity test type is selected, the Trends page presents a table with the Interface ID and the
Maximum Packet Loss for each interface.
If the throughput test type is selected, the Trends page displays a table with the Interface ID and the Maximum
Throughput for each interface.
To filter the results in the bar chart, click the desired Interface ID.
Trend Filters
The Trends page offers various filters to refine the displayed data and narrow down the analysis. The available
filters include:
l Select Device - Select a specific device from the available options to filter the test results associated with
that device.
l Test Type - Choose between the Connectivity or Throughput test types to filter the relevant test results.
l Test Name - Select a specific test name to filter the test results associated with that particular test.
l Start Date and End Date - Specify a start date and end date to filter the test results within a specific time
range.
Results
Results page provides a comprehensive overview of the Connectivity/ Throughput test results, including
completed tests and tests in progress.
Completed Tests
The Completed Tests panel displays a list of tests that have been completed. It includes the following
information for each test:
l Test Name - The name of the test performed.
l SSID - The SSID associated with the test, indicating the network or wireless access point being tested.
l Test Type - The type of test conducted, such as Connectivity or Throughput.
l Device Name - The name of the device used to perform the test, allowing users to track the source of the
test data.
l End Time - The timestamp indicating when the test was completed.
l Result - The result field represents the outcome of the test. It is color-coded and displays the number of
results categorized as Good(Green), Bad(Red), Fair(Orange), or Unknown(Blue). Click on the test results
Tests in Progress
The Tests in Progress panel provides users with a list of tests that are currently in progress or scheduled. It
includes the following information for each test:
l Test Name - The name of the test performed.
l SSID - The SSID associated with the test, indicating the network or wireless access point being tested.
l Test Type - The type of test conducted, such as Connectivity or Throughput.
l Sweep Mode - The sweep mode configured for the test, either recursive or baseline.
l Device Name - The name of the device designated to perform the test.
l State - The current state of the test.
Baseline
Baselines serve as reference points for evaluating the health and performance of the wireless network.
Baselines play an important role in detecting deviations from expected network behavior. SAM allows for the
configuration of multiple tests, including connectivity tests to measure packet loss and throughput tests to
assess overall performance.
Add a Baseline
Connectivity Baseline
Field Description
2.
Ping Server Enter IP address or FQDN of the ping server to perform connectivity tests.
4. Click Add.
Throughput Baseline
Field Description
Field Description
iPerf Server Enter iPerf server details. iPerf server generates TCP and UDP data streams which
can be used to measure throughput.
2.
4. Click Add.
To view the detailed information of a baseline, navigate to Service Assurance > Baseline, select the desired
baseline from the list and click View Details.
To delete a baseline, navigate to Service Assurance > Baseline, select the desired baseline from the list and
click Delete.
Schedule
The tests are the central activity of the SAM application that is dealt the most. A baseline test is performed
occasionally, but the scheduled tests and their results are monitored constantly.
Scheduled tests are measured against a baseline test for Connectivity and Throughput using the configurations
provided while creating the test. Only APs and SSIDs within the baseline test is measured in subsequent tests.
Field Description
Packet Loss Good Threshold Type a value for Packet Loss Good Threshold. If the measured packet
loss is above this threshold and baseline, the test result is classified as
Bad. If it falls between the threshold and the baseline, it is considered
Fair, while values below the threshold and baseline are categorized as
Good.
l If Throughput is selected as Test Type , you can configure the following fields:
Field Description
Field Description
Throughput Type a value for the Throughput Good Threshold in MB/s. If the measured throughput is
Good above this threshold, the test result is classified as Good. If it falls between the threshold and
Threshold the baseline, it is considered Fair, while values below the threshold are categorized as Bad.
(MB/s)
To delete a schedule, select a schedule from the list and click Delete.
To start a scheduled test, click start test icon under Actions field. To stop a running scheduled test, click stop
test icon under Actions field.
Copyright© 2025 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.