Frequently Asked Question

Troubleshooting Tip: Unable to connect to FortiGuard servers
Last Updated 9 months ago

Description

This article explains the possible reasons why FortiGate is unable to connect FortiGuard servers and offers steps to troubleshoot the problem.

The 'Unable to connect to FortiGuard servers' error message can be seen in two places under Dashboard -> Status -> Licenses.

  1. Go under System -> FortiGuard -> FortiGuard Updates.

FortiOS v7.6.x:

  1. Go under Dashboard -> Status -> Licenses.
  2. Go under System -> FortiGuard -> Subscriptions -> Licensed.
3.jpg
ScopeFortiGate, FortiWeb.
Solution

The communication between FortiGate and FortiGuard for web filtering and antispam is different from the communication for antivirus and IPS.

If public FortiGuard services or servers are suspected to be down in one or more regions (s), the following link provides status, outage, maintenance etc for such services:FortiGuard Anycast Query Status

  1. Check connectivity to FortiGuard servers by checking to ensure FortiGate correctly resolves DNS with the following hostnames:

execute ping service.fortiguard.net

execute ping update.fortiguard.net

execute ping guard.fortinet.net

execute ping securewf.fortiguard.net [ for HTTPS service ]

01.PNG

If DNS resolves but there is no ping, check the routing table (get router info routing-table all) to determine the best route for FortiGuard services (if ISDB is used in SD-WAN/policy route or static route) or the default route.

If all traffic is sent via an IPsec tunnel, ensure that:

  • Firewall policies are in place.
  • Phase 2 selectors are configured on both ends of the IPsec tunnel.

If SD-WAN is configured as the default route, verify:

  • SD-WAN rules for all traffic or FortiGuard services
  • FortiGuard configuration settings

config system fortiguard

set interface-select-method sdwan

end

See: Technical Tip: Functionality of 'set interface-select-method' for local-traffic with SD-WAN for more information.

Note:

Suppose connectivity to FortiGuard is required through one of the outgoing interfaces. In that case, it is possible to use 'interface-select-method' with the 'specify' action and then select the outgoing interface under the FortiGuard configuration.

config system fortiguard

set interface-select-method {specify}

set interface

end

If the DNS resolves and is able to ping, move to Step 2. If it is not resolving, check the DNS configuration.

Screenshot 2025-02-12 150411.png

Another possible FortiGuard connectivity failure scenario is where the FortiGate 'Time Settings' are set up manually with wrong time and date. The solution is to either adjust the time settings or switch it to using an NTP server. For example:

manualtime.PNG

Time settings menu can also be accessed through CLI:

config system ntp
set ntpsync [enable | disable]
set server-mode [enable | disable]

.......
end

One of the most possible causes is when the 'Use FortiGuard Servers' option is changed to 'Specify' for use with an internal DNS server, without switching the DNS protocols or validating if the new DNS Server supports DoT (default setting of FortiGuard servers) which uses TCP 853 or DoH that uses TCP 443.

If that happens, the DNS server will be unreachable, and DNS resolution will not work, as seen in the next picture.

Screenshot 2025-02-12 150211.png

After changing to UDP 53, the DNS will be reachable, and the resolution should start working. The following are the commands to change the protocol via CLI:

config system dns

set protocol cleartext <----- DoT is for using TCP/853, and cleartext is used for UDP/53.

end

Screenshot 2025-02-12 150125.png

In some cases, verify the system DNS config. Check any source-ip config and make sure the IP configured is public-facing and not an internal IP address. This is because the DNS needs to communicate with the public WAN to be able to reach the FortiGuard servers. If there are any internal 'source-ip' configured, unset to default (0.0.0.0) or configure a public-facing IP.

config system dns

set source-ip 0.0.0.0 <- default

  1. Run 'diagnose debug rating' in the CLI:

diagnose debug rating

02.PNG

The output of the command 'diagnose debug rating' displays flags next to the servers:


I: The server initially connected to validate the license and fetch the server list. Typically, only one server will have this flag.

The IP address FortiGate received when resolving the name service.fortiguard.net. If the administrator has not overwritten the FortiGuard FQDN or IP address in the FortiGuard configuration, there are usually two or three servers with this flag.

S: The IP address FortiGate received from FortiManager.

T: The server is not replying to FortiGate queries.

F: The server is down.

If all servers in the list have failed, this may mean either that all FortiGuard servers on the Fortinet side are down (unlikely) or that this FortiGate has a problem reaching them at the network level.

If the PPPoE interface is being used as a WAN interface, review the MTU value and configure TCP-MSS on the PPPoE interface.

fnsysctl ifconfig -a

The PPPoE interface name will be displayed as 'ppp(x)'.

ppp1 Link encap:Point-Point Protocol
inet addr:x.x.x.x Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1492 Metric:1

The MSS value should be = MTU - 40: Technical Tip: Cannot view some web sites when using PPPoE.

For example, if the MTU of the PPPoE interface is 1492:

config system interface
edit
set tcp-mss 1452
end

Even if the FortiGate is not using PPPoE, there could still be MTU issues along the path, either in the directly connected ISP or a transit ISP. Lowering the MTU is still a valid test. The best way to determine if there are MTU issues along the path is to perform a packet capture for the FortiGuard server IP the FortiGate is connecting to, and if the larger packets after the initial TCP handshake (1500 bytes MTU) do no get ACK'ed, it means they are getting dropped somewhere and MTU could be the reason.

If a VPN interface is being used as a WAN interface to reach Fortiguard servers, the MTU can be set as 1400 as follow:

config system fortiguard
set fortiguard-anycast disable
set sdns-server-ip "208.91.112.220"
set protocol udp
set port 53
unset source-ipset
set interface-select-method: specify
set interface To_Core_XYZ
end

An adjustment is made in the VPN interface:

config system interface
edit To_Core_XYZ
set mtu-override enable
set mtu 1400

end

  1. Under global settings, make sure that set cloud-communication is set to enable.

    FGT # config system global
    FGT (global) # set cloud-communication ?

    enable Allow cloud communication.
    disable Disable all cloud-related settings.
    FGT (global) #set cloud-communication enable
    FGT (global) #end

  2. If there are VDOMs enabled, all communication to the FortiGuard network is initiated from the management/root VDOM only.

    config sys global
    set management-vdom "root"
    end

However, from firmware v7.2 onwards in multi-VDOM mode, users can choose from which VDOM FortiGuard services and updates are initiated instead of being locked to the management VDOM.

config global
config system fortiguard
set vdom "root"
end
end


The VDOM specified should be able to reach the internet. To enable the specified non-management VDOM to make and resolve DNS queries, configure vdom-dns as noted in this document: Allow FortiGuard services and updates to initiate from a traffic VDOM

config vdom

edit root

config system vdom-dns

set vdom-dns enable

set primary 208.91.112.53

set primary 208.91.112.52

end

next

end

To set up FortiGuard services on a non-management VDOM:

  • Specify the VDOM to be used under 'config system fortiguard'.
  • Ensure that the specific VDOM has connectivity to the internet.
  • vdom-dns should be configured to allow the VDOM to generate its own DNS requests.
  1. Verify Antivirus & IPS Definition and Filtering Services: Check Antivirus & IPS Definition under System -> FortiGuard -> AntiVirus & IPS Updates -> Update AV and IPS Definitions.
03.PNG

v7.2.x:

The active subscriptions under System -> FortiGuard are being updated with the 'FortiGuard Updates', the options for 'AntiVirus & IPS Updates' have been removed.

6.jpg

v7.6.x:

The active subscriptions under System -> FortiGuard -> Subscriptions -> Licensed are being updated with the 'FortiGuard Updates' System -> FortiGuard -> FortiGuard settings.

4.jpg 5.jpg

Check Filtering Services under System -> FortiGuard -> Filtering.

04.PNG

v7.6.x:

Check Filtering Services under System -> FortiGuard -> FortiGuard settings and then expand the Filtering option.

7.jpg

Anycast servers: If FortiGuard is not reachable via the default Anycast method, it is suggested to disable Anycast and switch back to unicast servers (Anycast communication).

config system fortiguard

set fortiguard-anycast disable

set protocol udp

set port 8888

set sdns-server-ip 208.91.112.220 173.243.140.53 210.7.96.53

end

For FortiGuard's SDNS rating service, there are two modes in FortiOS:

Mode 1: Use of unicast network, which uses the DNS over UDP protocol for FortiGate and FortiGuard transactions.

Mode 2: Use of Anycast network (default), which uses DNS over TLS protocol for FortiGate and FortiGuard transactions.

  • To use UDP/53:

config system fortiguard

set fortiguard-anycast disable

set sdns-server-ip 208.91.112.220 173.243.140.53 210.7.96.53

end

  • To use DoT (TCP/853).

config system fortiguard

set fortiguard-anycast enable

end

With Anycast, FortiGate is only aware of one single server IP. This is a floating IP address that will connect to the closest server geographically, and if this server is down, it will point to another server instead. With Unicast, the FortiGate must maintain a list of servers that it tries, and if one stops working, it then switches over to another.

05.PNG

In many cases, problems related to FortiGuard are caused by ISPs. Some ISPs block traffic on port 53 that is not DNS or that contains large packets. In those cases, the solution is to use port 8888.

Other ISPs block traffic to HTTPS port 8888. In those cases, the solution is to use UDP port 53.

There are also a few cases where ISPs block traffic based on source ports. Changing the source port range for FortiGuard with a range below usually fixes the issue:

config sys global

set ip-src-port-range 1031-4999
end

Related port information:

  • Encrypted Virus Samples auto-submitted to FortiGuard – 25.
  • DNS lookups – 53 UDP.
  • FortiGuard Server List requests to FortiGuard – 53 UDP.
  • AntiSpam or Web Filtering rating lookup queries to FortiGuard – 53 UDP or 8888 UDP.
  • URL/AS rating lookup queries to FortiGuard – 53 UDP.
  • Real-time Black List (RBL) lookup requests to RBL services – 53 UDP.
  • Fortinet Device Registration to FortiGuard – 80 HTTP.
  • Firmware and Signature Downloads from FortiGuard – 443 HTTPS.
  • FortiGuard Server List requests to FortiGuard – 1027 UDP / 1031 UDP.
  • AntiSpam and Web Filtering rating lookup requests – 1027 UDP / 1031 UDP.
  • AV/IPS Push / FortiGuard to FortiGate – 9443 UDP.
  1. To configure FortiGate to use worldwide servers or only servers located in the USA, run the following command in the CLI:

    config system fortiguard
    set update-server-location [usa/any]
    end


This can also be done under System -> FortiGuard -> FortiGuard Update in the GUI.

06.PNG

v7.6.x:

This can also be done under System -> FortiGuard -> FortiGuard settings.

8.jpg

Some debug commands for FortiGuard:

diagnose debug reset

diagnose debug application update -1

diagnose debug console timestamp enable

diagnose debug enable

Force FortiGuard update after running debug application update -1:

execute update-now

The following command can also fix various issues with FortiGuard servers. In this example, 212.48.23.12 is used as the IP for the interface to the ISP router.

config system fortiguard

set fortiguard-anycast disable

set protocol udp

set port 8888

set sdns-server-ip 208.91.112.220 173.243.140.53 210.7.96.53

set ddns-server-ip 173.243.138.225

set source-ip 212.48.23.12

end

config system dns set primary 8.8.8.8 set source-ip 212.48.23.12end Source IP should match the IP address on the WAN port of FortiGate (ISP port), If the Source IP is changed, DNS and FortiGuard settings should be changed as well. Note:Despite changing the FortiGuard settings to anycast disable and configuring the UDP protocol to reach the FortiGuard servers, the connection still fails because the DNS servers will still use the 'DNS over TLS' settings, which is a default setting. In this case, public IPs will be reachable, but DNS resolution fails. Changing the DNS settings to use 'DNS over UDP' will help in resolving the domain names properly.
  1. Try to take the following debugs :


diagnose debug reset

diagnose debug application update -1

diagnose debug console timestamp enable

diagnose debug enable

execute update-now

In this case, the output of the debugs looks like:


upd_act_setup_with_action[190]-Trying FDS 173.243.138.68:443
tcp_connect_fds[231]-select() timed out
upd_comm_connect_fds[423]-Failed TCP connect

Try to use 'interface-select-method' with the 'specify' action and then select the outgoing interface under the FortiGuard configuration as mentioned above.

This error may also be related to FortiGate not being able to establish a TCP connection to FortiGuard through the proxy if the proxy is configured on FortiGate.
Verify on the proxy that it allows FortiGuard traffic and does not block TCP connections. Additionally, make sure that the proxy is not doing SSL inspection for FortiGuard traffic.

License errors may be found in two places, as shown below:

  • Dashboard -> Status -> Licenses.
  • System -> Config -> FortiGuard.
  1. If DNS issues occur, the following output will be seen in the CLI:

DNS issue with Fortiguard.png
Verify DNS settings in FortiWeb under Network -> DNS. Verify the reachability of the DNS IP. If the DNS is private, change to a public DNS and verify the connectivity. If the DNS resolves, check reachability. If there is any firewall, allow the ICMP for FortiWeb.
  1. If there is any firewall in place, allow traffic to all destinations for testing purposes. If this fixes the license issue, it indicates the issue is on the firewall policy level.
  2. If all checks have been performed successfully, collect the following logs and share them in a ticket created with support:

diagnose debug application fds 7
diagnose debug application update 7

diagnose debug console timestamp enable

diagnose debug enable
execute update-now

To disable the debug:

diagnose debug disable

diagnose debug reset

FortiGuard licenses and the communication to FortiGuard are viewable via GUI through System -> FortiGuard as well as through the CLI using the following commands:

diagnose autoupdate versions

The output is quite long, but it is possible to pipe the output to grep:

diagnose autoupdate versions | grep -A6 "IPS Attack Engine"


If the communication to FortiGuard is OK, but still the Web Filter is shown as 'disabled' in the 'diag debug rating' output:

diagnose debug rating
Locale : english

Service : Web-filter
Status : Disable <--

Service : Antispam
Status : Disable

Service : Virus Outbreak Prevention
Status : Disable

The Web Filter should be licensed:

Untitled picture.png

Check the firewall policy. If there is no Web Filter Profile configured in the firewall policy, the web filter will be shown as disabled in the 'diag debug rating' output.

Note:

If the error persists after applying changes, try accessing the same page in another browser or a private window, as the browser might be displaying a cached version of the page.

Check if there are any upstream devices towards the internet, and make sure to allow UDP port 53 or port 8888 services in the upstream devices and not block these services for the FortiGuard Connectivity.

To change the FortiGuard anycast status from disabled to enabled:

config system fortiguard

set fortiguard-anycast enable

set fortiguard-anycast-source fortinet

end

Run a sniffer to check the communication between FortiGuard servers and the FortiGate.

In this example, the port communication is 8888. This will depend on the port used for communications between FortiGuard servers and the FortiGate.

FGT81E-1 (root) # diagnose sniffer packet any "port 8888" 4 0 l
interfaces=[any]
filters=[port 8888]
2025-06-30 19:16:59.554635 wan1 out 99.155.236.254.24391 -> 12.34.97.71.8888: udp 110
2025-06-30 19:16:59.587549 wan1 in 12.34.97.71.8888 -> 99.155.236.254.24391: udp 32
2025-06-30 19:17:00.985143 wan1 out 99.155.236.254.24391 -> 12.34.97.71.8888: udp 129
2025-06-30 19:17:01.017842 wan1 in 12.34.97.71.8888 -> 99.155.236.254.24391: udp 32
2025-06-30 19:17:02.887007 wan1 out 99.155.236.254.24391 -> 12.34.97.71.8888: udp 118
2025-06-30 19:17:02.919602 wan1 in 12.34.97.71.8888 -> 99.155.236.254.24391: udp 32
2025-06-30 19:17:09.733639 wan1 out 99.155.236.254.24391 -> 12.34.97.71.8888: udp 129
2025-06-30 19:17:09.737496 wan1 out 99.155.236.254.24391 -> 12.34.97.71.8888: udp 129
2025-06-30 19:17:09.739352 wan1 out 99.155.236.254.24391 -> 12.34.97.71.8888: udp 129
2025-06-30 19:17:09.764794 wan1 in 12.34.97.71.8888 -> 99.155.236.254.24391: udp 32
2025-06-30 19:17:09.768763 wan1 in 12.34.97.71.8888 -> 99.155.236.254.24391: udp 32
2025-06-30 19:17:09.770504 wan1 in 12.34.97.71.8888 -> 99.155.236.254.24391: udp 32
2025-06-30 19:17:13.976504 wan1 out 99.155.236.254.24391 -> 12.34.97.71.8888: udp 113
2025-06-30 19:17:14.007701 wan1 in 12.34.97.71.8888 -> 99.155.236.254.24391: udp 32

Make sure the there is communication between both ends.

Please Wait!

Please wait... it will take a second!