The standout thing about FortiOS is how unified it is. It ties together networking, security, and management in one operating system, which makes Fortinet’s devices feel more cohesive than many competitors’.
Here are a few highlights most people appreciate:
Integrated Security Fabric: It connects firewalls, switches, access points, and endpoints under a single management and policy framework, which simplifies complex networks.
Performance and efficiency: FortiOS is built on Fortinet’s custom ASIC hardware (like NP and CP processors), so it can handle deep inspection and threat prevention at high speeds.
Rich feature set: It combines next‑gen firewall, SD‑WAN, IPS, VPN, and web filtering capabilities without needing a lot of add‑ons.
Centralized visibility: The GUI and FortiAnalyzer/FortiManager integrations give solid visibility into traffic, users, and threats.
Automation and AI: Newer versions include automated playbooks and FortiAI-driven threat detection—useful for reducing manual response time.
What context are you thinking about—enterprise deployment, lab testing, or just general curiosity? I can tailor the details (e.g., best features for SD‑WAN vs. security operations). Review collected by and hosted on G2.com.
Common Things People Dislike About FortiOS
1. GUI Inconsistency Between Versions
Fortinet frequently changes the layout, naming, or locations of options in the GUI.
This makes upgrading feel like learning a new interface each time.
Examples:
WAN configuration placement changed between versions
Policy views & SD‑WAN menus keep moving
Logging options get renamed or relocated
2. Some Features Are Only Fully Usable via CLI
Even though the GUI is good, certain advanced settings require CLI commands.
Admins often complain about needing CLI for:
Complex SD‑WAN rules
Detailed session control
Deep debugging
Advanced routing tweaks
3. SD‑WAN Can Be Confusing for New Users
FortiOS SD‑WAN is powerful but feels complex, especially when combining:
SD‑WAN rules
Performance SLAs
Health checks
Policy routes
Firewall policies referencing SD‑WAN zones
Many users say SD‑WAN in FortiOS is “too many steps for a simple thing.”
4. Frequent Upgrades Required to Avoid Bugs
FortiOS occasionally introduces bugs in new builds (like SSL-VPN issues, Web Filter crashes, HA failover glitches).
Admins often wait for “mature” releases.
5. SSL‑VPN Performance Issues on Lower Models
On mid- or entry-level FortiGate units, SSL‑VPN can:
Max out CPU
Drop throughput significantly
Become unstable with many users
IPSec is generally better but requires more setup.
6. Licensing Complexity
Fortinet licensing is not terrible, but:
Many features are bundled (not modular)
Multiple license types (UTM, Enterprise, 360 Protection, Zero Trust)
Fabric Agent integrations are confusing for new users
7. Logs Can Become Overwhelming
FortiOS generates a massive amount of logs.
Finding the exact log you want sometimes feels like hunting through noise.
While FortiAnalyzer helps, it adds cost.
8. FortiCloud & Remote Management Lag
FortiCloud is convenient but sometimes:
Feels slow
Has session drops
Syncs late
GUI elements don't load quickly
This frustrates remote administrators.
9. HA Failover Behavior Can Be Tricky
High-availability clusters work well, but:
Config sync can fail silently
Interface monitoring must be tuned
SD‑WAN failover adds complexity
HA upgrades require careful planning
10. Not All Features Are Intuitive
Examples:
Proxy-based vs flow-based confusion
Web Filter profiles vs DNS Filter vs Application Control
Implicit policies (hidden defaults)
Routing table behavior with SD‑WAN zones
This can be overwhelming for junior admins. Review collected by and hosted on G2.com.
Validated through a business email account
Organic review. This review was written entirely without invitation or incentive from G2, a seller, or an affiliate.


