Posted by2 years ago
- Forticlient Offline Installer X64 10
- Forticlient Offline Installer 64 Bit
- Forticlient Offline Installer X64 64
Archived
I thought i'd make this post, as I've spent the morning looking into the best way to deploy the FortiClient as VPN only. There is a standalone SSL VPN installer however I have some staff who use the app on iPads on their mobiles so wanted to keep a consistent interface for them between programs. Outside of the licensing the EMS there doesn't seem to be a simple solution to this.
Most steps online suggested editing the MSI file to disable the unwanted features by reducing their InstallLevel to 0, however that requires installing editing tools like Orca or InstallShield.
When you do open the MSI file in an editing tool, each of the different components have different Install Levels set. You can use these with a the INSTALLLEVEL= flag to choose what features are or are not installed.
Forticlient Offline Installer X64 10
Here are the install levels for the features taken from the installer for 5.4.3 FortiClient.
Feature Name | Install level |
---|---|
Feature_Core | 1 |
Feature_Basic | 1 |
Feature_AntiVirus | 5 |
Feature_WebFilter | 5 |
Feature_VPN | 3 |
Feature_SSLVPN | 1 |
Feature_WanAcceleration | 5 |
Feature_EndPointNAC | 3 |
Feature_Firewall | 5 |
Feature_Vulnerability | 5 |
Feature_SingleSignOnMobility | 3 |
So long as the INSTALLLEVEL flag is equal to or less than the level of the feature. So if you wish to just install the SSL VPN you can use the following command:
The default install level when running msiexec is 100, which means all features are installed.
Information on the INSTALLLEVEL switch can be found on msdn
If you do install software to modify the default install level of the Features in the .MSI file, you could then create custom installers by adjusting the install level of unwanted features above a threshold.
I've tested this on x64 Windows 7 and succesfully installed only the SSLVPN client, which was my original aim. Hopefully this information is helpful for anyone who needs it.
3 comments
Firmware images and tools
The following files are available from the Fortinet support site:
File | Description |
---|---|
FortiClientTools_6.2.0.xxxx.zip | Zip package containing miscellaneous tools, including VPN automation files. |
FortiClientSSOSetup_6.2.0.xxxx.zip | FortiClient Single Sign On (FSSO)-only installer (32-bit). |
FortiClientSSOSetup_6.2.0.xxxx_x64.zip | FSSO-only installer (64-bit). |
Forticlient Offline Installer 64 Bit
The FortiClient (Windows)6.2.0 standard installer and zip package containing FortiClient.msi and language transforms are included with FortiClient EMS 6.2.0.
The following tools and files are available in the FortiClientTools_6.2.xx.xxxx.zip file:
File | Description |
---|---|
FortiClientVirusCleaner | Virus cleaner. |
SSLVPNcmdline | Command line SSL VPN client. |
SupportUtils | Includes diagnostic, uninstallation, and reinstallation tools. |
VPNAutomation | VPN automation tool. |
Forticlient Offline Installer X64 64
The following files are available from FortiClient.com:
File | Description |
---|---|
FortiClientVPNSetup_6.2.0.xxxx.exe | Free VPN-only installer (32-bit). |
FortiClientVPNSetup_6.2.0.xxxx_x64.exe | Free VPN-only installer (64-bit). |
Review the following sections prior to installing FortiClient version 6.2.0: Introduction, Special notices, and Product integration and support. |
Installation options
When the administrator creates a FortiClient deployment package in EMS, they choose which setup type and modules to install:
- Secure Remote Access: VPN components (IPsec and SSL) are installed.
- Advanced Persistent Threat (APT) Components: FortiSandbox detection and quarantine features are installed.
- Additional Security Features: One or more of the following features are installed: AV, Web Filtering, Single Sign On, and Application Firewall.
It is recommended to not install VPN components on Windows Server systems if not required. |
The FortiClient (Windows) installer is available on EMS. You can configure and select installed features and options on EMS. |
Upgrading from previous FortiClient versions
FortiClient version 6.2.0 Andhra jyothi old editions new. supports upgrade from FortiClient versions 6.0 and later.
Starting with FortiClient 6.2.0, FortiClient EMS 6.2.0, and FortiOS 6.2.0, the FortiClient Endpoint Telemetry license is deprecated. The FortiClient Compliance profile under Security Profiles and the Enforce FortiClient Compliance Check option on the interface configuration pages have been removed from the FortiOS GUI. Endpoints running FortiClient 6.2.0 now register only with FortiClient EMS 6.2.0 and compliance is accomplished through the use of compliance verification rules configured on FortiClient EMS 6.2.0 and enforced through the use of firewall policies. As a result, there are two upgrade scenarios:
- Customers using only a FortiGate device in FortiOS 6.0 to enforce compliance must install FortiClient EMS 6.2.0 and purchase a FortiClient Security Fabric Agent License for their FortiClient EMS installation to continue using compliance features.
- Customers using both a FortiGate device in FortiOS 6.0 and FortiClient EMS running 6.0 for compliance enforcement must upgrade the FortiGate device to FortiOS 6.2.0, FortiClient to 6.2.0, and FortiClient EMS to 6.2.0.
FortiClient (Windows)6.2.0 features are only enabled when connected to EMS 6.2.0. If FortiClient (Windows) 6.0 was previously running in standalone mode, ensure to install EMS 6.2.0, apply the license as appropriate, then connect FortiClient (Windows) to EMS before upgrading to FortiClient (Windows)6.2.0. You should first upgrade any endpoint running a FortiClient (Windows) version older than 6.0.0 to 6.0.5 using existing 6.0 upgrade procedures.
See the FortiClient and FortiClient EMS Upgrade Paths for information on upgrade paths and order in which to upgrade Fortinet products.
Downgrading to previous versions
Downgrading FortiClient version 6.2.0 to previous FortiClient versions is not supported.
Firmware image checksums
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support portal. After logging in, click on Download > Firmware Image Checksums, enter the image file name, including the extension, and select Get Checksum Code.