Fortinet zaprezentował najnowszą wersję oprogramowania dla FortiOS o oznaczeniu 7.0.0. W nowej wersji dodano ponad 300 nowych funkcji oraz poprawiono błędy wcześniejszej wersji. Jakich nowych rozwiązań możemy się spodziewać? Otóż dodano nową funkcjonalność dla użytkowników bezprzewodowych. Od teraz będzie można stosować obsługę profili NAC dla użytkowników SSID. Co więcej, serwer DHCP będzie wymuszał od użytkownika dokończenia procesu przydzielania adresu – w przeciwnym razie, gdy nie dotrze do końca procesu lub użytkownik zmieni adres na statyczny, zostanie pozbawiony dostępu do sieci. W wersji 7.0.0 dodano nowe rozwiązanie- Zero Trust Network Acces, dzięki któremu możemy zastąpić tradycyjny VPN, przez co uzyskamy lepszą możliwość pod względem komfortu i bezpieczeństwa dla użytkownika. Z większych nowości – dodano nowy profil ochrony video, dzięki któremu można blokować całe kategorie, jak i same kanały na portalu YouTube. Ciekawostką nowej wersji jest dodanie retro motywu GUI, które nawiązuje do wersji 3.0. Po więcej szczegółowych informacji o nowych funkcjach, zapraszam do dalszej części artykułu.
Główne funkcjalonosci w 7.0.0:
- Poprawa działalności SD-WAN wraz z obsługą 5G
- Zintegrowane Wi-Fi 6
- Rozbudowany system wykrywania i reagowania na punktach końcowych (EDR)
- Video Filter- Nowy filtr ochronny, który pozwoli na wygodne zarządzanie.
- Zero Trust Network Access- dzięki temu rozwiązaniu, możemy zastąpić VPN i uzyskać lepszy komfort zarzadzania.
- Interfejs użytkownika– zostało wprowadzone wiele zmian w interfejsie graficznym, dodano nową kolorystykę.
- Interfejs retro GUI
Dzięki FortiOS 7.0.0, zostało naprawionych wiele błędów, takich jak:
- Problem z dużym użyciem pamięci, wskutek błędnego ruchu między VDOM
- Błędne działanie L2TP, które powodowało zapętlanie
- Brak działania STP w trybie transparentnym
- Problem z tworzeniem polityk opartych na MAC adresie w trybie NGFW
- Trudności z uwierzytelnianiem użytkowników FSSO
- Błędne działanie DLP, problem dotyczył braku wykrywania plików ZIP i PDF
Więcej informacji dotyczących rozwiązanych problemów, znajdziesz w dalszej części artykułu.
Wspierane modele:
FortiGate:
FG-40F, FG-40F-3G4G, FG-60E, FG-60E-DSL, FG-60E-DSLJ, FG-60E-POE, FG-60F, FG-61E, FG-61F, FG-80E, FG-80E-POE, FG-81E, FG-81E-POE, FG-90E, FG-91E, FG-100E, FG-100EF, FG-100F, FG-101E, FG-101F, FG-140E, FG-140E-POE, FG-200E, FG-201E, FG-300E, FG-301E, FG‑400E, FG‑401E, FG‑500E, FG-501E, FG-600E, FG-601E, FG-800D, FG‑900D, FG-1000D, FG-1100E, FG-1101E, FG‑1200D, FG-1500D, FG-1500DT, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-3000D, FG-3100D, FG‑3200D, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3600E, FG-3601E, FG-3700D, FG-3800D, FG-3960E, FG‑3980E, FG-5001E, FG‑5001E1
FortiWiFi:
FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F
FortiGate Rugged:
FGR-60F, FGR-60F-3G4G
FortiGate VM:
FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG‑VM64‑GCP, FG-VM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG‑VM64‑OPC, FG‑VM64-RAXONDEMAND, FG-VM64-SVM, FG-VM64-VMX, FG-VM64-XEN
Pay-as-you-go images:
FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-XEN
Nowe funkcjalosci:
Bug ID | Description |
---|---|
489956 | Add a new LAG implementation so each session uses the same NP6 and XAUI for ingress and egress direction to avoid the fast path congestion (the default value is disable ).
config system npu set lag-out-port-select {enable | disable} end Add a new algorithm in the NPU driver to the bond algorithm list (AGG_ALGORITHM_NPU). |
497049 | Support HTTP2 in proxy mode by adding the ability to inspect HTTP2 via ALPN.
config firewall ssl-ssh-profile edit <name> set supported-alpn {http1-1 | http2 | all | none} next end |
520385 | Allow denied sessions to be offloaded by the NPU when session-denied traffic is also enabled. This enables sessions to be offloaded for packets that are denied by the firewall policy, which can help reduce CPU usage.
config system npu session-denied-offload {enable | disable} end |
609692 | Add new setting to enable auto provisioning of FortiSwitch firmware upon authorization. On FortiGate models with a disk, up to four images of the same FortiSwitch model can be uploaded. On FortiGate models without a disk, one image of the same FortiSwitch model can be uploaded. |
611992 | Add a specific auth-timeout field in the SSL VPN monitor. |
618359 | In scenarios where the FortiGate is sandwiched by load-balancers and SSL processing is offloaded on the external load-balancers, the FortiGate can perform scanning on the unencrypted traffic by specifying the ssl-offloaded option in the protocol options profile. This was previously supported in proxy mode only, but now it is also supported in flow mode. |
621725 | Add settings to enable flow control and pause metering. Pause metering allows the FortiSwitch to apply flow control to ingress traffic when the queue is congested and to resume once it is cleared. |
621728 | On supported managed switch ports, the FortiGate allows the port to be configured with a forward error correction (FEC) state of Clause 74 FC-FEC for 25 Gbps ports, or Clause 91 RS-FEC for 100 Gbps ports.
config switch-controller managed-switch edit <serial number> config ports edit <name> set fec-state {disabled | cl74 | cl91} next end next end |
622053 | Add RADIUS CoA support for SSL-VPN. After receiving a Disconnect Request(40) from a RADIUS server, the SSL VPN daemon will search related sessions according to user name and RADIUS server name to log off the specific user (including web and tunnel session). |
630468 | Make the following enhancements to the antiphishing profile:
|
634006 | OpenSSL updated to 1.1.1j for security fixes. |
635344 | Add XAuth User to VPN chart in the PDF report. |
637108 | In 6.2, stream-based AV scan was added in proxy mode for HTTP(S). This is now supported for FTP(S), SFTP, and SCP. The stream-based scan optimizes memory utilization for large archive files like ZIP, TAR.GZ, and so on by decompressing the files on the fly and scanning files as they are extracted. Smaller files can also be scanned directly on the proxy-based WAD daemon, improving traffic throughput. |
637552 | Enhance freestyle log filtering so that users can specify more powerful filters. The config free-style setting is added to log filters for each log device. For example:
config log memory filter config free-style edit 1 set category {event | virus | webfilter | attack | spam | anomaly | voip | dlp | app-ctrl | waf | gtp | dns | ssh | ssl | file-filter | icap} set filter <string> set filter-type include next end end The filter string can be a legal regular filter string. For example, |
638352 | To avoid large number of new IKEv2 negotiations from starving other SAs from progressing to established states, the following enhancements have been made to the IKE daemon:
The IKE embryonic limit can now be configured in the CLI. config system global set ike-embryonic-limit <integer> end |
641077 | After authorizing a FortiAP, administrators can also register the FortiAP to FortiCloud directly from the FortiGate GUI. |
641524 | Add interface selection for IPS TLS protocol active probing.
config ips global config tls-active-probe set interface-selection-method {auto | sdwan | specify} set interface <interface> set vdom <VDOM> set source-ip <IPv4 address> set source-ip6 <IPv6 address> end end |
644218 | The host protection engine (HPE) has been enhanced to add monitoring and logging capabilities when the HPE is triggered. Users can enable or disable HPE monitoring, and configure intervals and multipliers for the frequency when event logs and attack logs are generated. These logs and monitors help administrators analyze the frequency of attack types and fine-tune the desired packet rates in the HPE shaper.
config monitoring npu-hpe set status {enable | disable} set interval <integer> set multiplers <m1>, <m2>, ... <m12> end The interval is set in seconds (1 – 60, default = 1). The multiplies are twelve integers ranging from 1 – 255, the default is An event log is generated after every (interval × multiplier) seconds for any HPE type when drops occur for that HPE type. An attack log is generated after every (4 × multiplier) number of continuous event logs. |
644235 | Support reference to any action results in chained actions of automation stitches. |
647800 | AWS and Azure now support FIPS ciphers mode. |
648595 | A custom IKE port and IKE NAT-T port can be specified to replace the default UDP/500 and UDP/4500 respectively for IKE negotiation.
config system settings set ike-port <1024-65535> set ike-natt-port <1024-65535> end |
648602 | When creating a Cisco ACI direct connector, configuring multiple IPs allows the FortiGate to connect to the server in a round-robin fashion. Only one server will be active and the remaining will serve as backups if the active one fails. |
650416 | On IBM VPC Cloud, users can deploy their BYOL FortiGate VMs in unicast HA. HA failover triggers routing changes and floating IP reassignment on the IBM Cloud automatically via the API. |
651866 | FortiSwitch events now have their own category on the Events log page. |
652003 | In a tenant VDOM, allow lldp-profile and lldp-status to be configurable on a leased switch port. |
652503 | By configuring the service chain and service index, NSX-T east-west traffic can be redirected to a designated FortiGate VDOM.
config nsxt setting set liveness {enable | disable} set service <service name> end config nsxt service-chain edit <ID> set name <chain name> config service-index edit <forward index> set reverse-index <value> set name <index name> set vd <VDOM> next end next end The default value for |
654032 | The route tag is a mechanism to map a BGP community string to a specific tag. The string may correspond to a specific network that a BGP router advertised. Using this tag, an SD-WAN service rule can be used to define specific handling of traffic to that network. In this enhancement, IPv6 route tags are now supported. |
655388 | When units are out-of-sync in an HA cluster, the GUI will now compare the HA checksums and display the tables that caused HA to be out-of-sync. This can be visualized in the HA monitor page and the HA Status widget. |
655942 | Add new commands execute telnet-options and execute ssh-options to allow administrators to set the source interface and address for their connection. |
656039 | Allow SD-WAN duplication rules to specify SD-WAN service rules to trigger packet duplication. This allows SD-WAN duplication to occur based on an SD-WAN rule instead of the source, destination, or service parameters in the duplication rule. |
657598 | In an application control list, the exclusion option allows users to specify a list of applications they wish to exclude from an entry filtered by category, technology, or others.
config application list edit <list> config entries edit 1 set category <ID> set exclusion <signature ID> ... <signature ID> next end next end |
657812 | When an SSL inspection profile is configured to protect the SSL server, multiple sites can potentially be deployed on the same protected server IP. This change adds support for multiple SSL certificates to attach to a SSL profile, allowing inspection based on matching SNI in the certificate. |
658096 | Add four new SNMP OIDs for polling the number of packets and bytes that conform to traffic shaping, or are discarded by traffic shaping. |
658206 | New REST API POST /api/v2/monitor/vpn/ike/clear?mkey=<gateway_name> will bring down IKE SAs tunnel the same way as diagnose vpn ike gateway clear . |
658525 | The limit of BGP paths that can be selected and advertised has increased to 255 (originally 8). |
659105 | Add a toggle to return node IP addresses only in dynamic firewall addresses for Kubernetes SDN connectors. |
659127 | Add support to deploy FortiGate-VMs that are paravirtualized with SR-IOV and DPDK/vNP on OCI shapes that use Mellanox network cards. |
659346 | Add additional information such as DHCP server MAC, gateway, subnet, and DNS to wireless DHCP logs. |
660250 | Add global option fortiipam-integration to control FortiIPAM. When enabled, ipamd will run and report to FortiIPAM to allow automatic IP address/subnet management.
config system global set fortiipam-integration {enable | disable} end |
660273 | By default, the FortiGate uses the outbound interface’s IP to communicate with a FortiSwitch managed over layer 3. The switch-controller-source-ip option allows the switch controller to use the FortiLink fixed address instead. |
660283 | Add system event logs for the execution of CLI commands. When cli-audit-log is enabled under system global , the execution of execute , config , show , get , and diagnose commands will trigger system event logs. |
660295 | Provide specific SNMP objects (OIDs) that allow the status of the mobile network connection to be monitored. |
660596 | Because pre-standard POE devices are uncommon in the field, poe-pre-standard-detection is set to disable by default. Upgrading from previous builds will carry forward the configured value. |
660624 | When enabling the Security Fabric on the root FortiGate, the following FortiAnalyzer GUI behavior has changed:
|
660653 | The Wi-Fi Alliance Agile Multiband Operation (MBO) feature enables better use of Wi-Fi network resources in roaming decisions and improves overall performance. This enhancement allows the FortiGate to push the MBO configuration to managed APs, which adds the MBO information element to the beacon and probe response for 802.11ax. |
661105 | Support FGSP four-member cluster session synchronization and redundancy. |
661131 | Enabling IGMP snooping on an SSID allows the wireless controller to detect which FortiAPs have IGMP clients. The wireless controller will only forward a multicast stream to the FortiAP where there is a listener for the multicast group. |
661252 | Add object synchronization improvements:
|
662437 | When a FortiSwitch upgrade is stuck due to connectivity issues, the following command allows the process to be cancelled.
|
663206 | When an AliCloud SDN connector is configured, dynamic address objects can support Kubernetes filters based on cluster, service, node, pod, and more. |
663530 | IoT background scanning is disabled by default. Users can enable this option on the FortiLink Interface page in the GUI or with the switch-controller-iot-scanning in the CLI. |
663877 | Add Application Bandwidth widget:
|
664312 | Integrate Broadcom bnxt_en 1.10.1 driver to drive new vfNIC to replace 1.9.2 version. The following new cards are supported:
|
664826 | When multi-VDOM mode is enabled, the threat feed external connector can be defined in global or within a VDOM. Global threat feeds can be used in any VDOMs, but are not editable within the VDOM. FortiGuard category and domain name based external feeds have added a category number field to identify the threat feed. |
665186 | Add Security Rating test, Activate FortiCloud Services, to check whether FortiCloud services can be activated for FortiAnalyzer Cloud, FortiManager Cloud, FortiClient EMS Cloud, and FortiSandbox Cloud. If the account has a valid subscription to a service or cloud appliance, but the Fabric connection to it on the FortiGate is not enabled, then the test fails. |
665735 | The user device store allows user and device data collected from different daemons to be centralized for quicker access and performance:
diagnose user-device-store device memory list diagnose user-device-store device memory query mac <value> diagnose user-device-store device memory query ip <value> diagnose user-device-store device disk list diagnose user-device-store device disk query <SQL WHERE clause> |
668362 | Support multiple LDAP server configurations for Kerberos keytab and agentless NTLM domain controller in multiple forest deployments. |
668487 | In NGFW policy mode, application groups can be defined with the following filters: risk, protocols, vendor, technology, behavior, and popularity. |
668991 | Security Fabric rating reports can now be generated in multi-VDOM mode, against all VDOMs. The Security Rating is visible under Global scope. |
669033 | Backend update to support a TCP connection pool to maintain local-out TCP connections to the external ICAP server. |
669158 | The SD-WAN Network Monitor service now supports running a speed test based on a schedule. The test results are automatically updated in the interface measured-upstream-bandwidth and measured-downstream-bandwidth fields. When the scheduled speed tests run, it is possible to temporarily bypass the bandwidth limits set on the interface and configure custom maximum or minimum bandwidth limits. These configurations are optional. |
669487 | Web traffic over HTTP/HTTPS can be forwarded selectively by the FortiGate’s transparent web proxy to an upstream web proxy to avoid overwhelming the proxy server. Traffic can be selected by specifying the proxy address, which can be based on a FortiGuard URL category. |
670677 | When a BGP next hop requires recursive resolution, the default behavior is to consider all other routes except BGP routes. The following option, when enabled, allows the recursive next hop resolution to use BGP routes as well.
config router bgp set recursive-next-hop {enable | disable} end |
671563 | Add option to switch between Peer and Peer Group view on PKI user page. |
672573 | FortiExtender and VPN tunnel interfaces now support NetFlow sampling. VPN tunnel interfaces can be IPsec, IP in IP, or GRE tunnels. NetFlow sampling is supported on NPU and non-NPU offloaded tunnels. |
673072 | When a HTTP request requires authentication in an explicit proxy, the authentication can be redirected to a secure HTTPS captive portal. Once authentication is done, the client can be redirected back to the original destination over HTTP. |
673205 | In Dashboard > Users and Devices, administrators can use the FortiSwitch NAC VLANs widget to see which devices have been added to which VLANs by the NAC policy. A donut chart overview summarizes the number of devices in each VLAN. |
673371 | Support ICMP type 13 at local interface. |
673590 | Policy hit counters are now seven-day rolling counters. Instead of storing a single number for the hit count and byte count collected since the inception of each policy, seven numbers for the last seven days plus an active counter for the current day are stored. The past seven-day hit count is displayed on the policy list and policy dialog page. A seven-day bar chart for additional visualization of the statistics has been added. These changes help put the policy hit count comparison on the same footing. |
674507 | Using the ARM64_KVM image, users can deploy the FortiGate VM on KVM hypervisors running ARM64 processors. |
674653 | In order to support packet duplication on dial-up IPsec tunnels between sites, each spoke must configure a location ID. On the dial-up VPN hub, packet duplication can be performed on tunnels in the IPsec aggregate with the same location ID.
config system settings set location-id <IPv4 address> end |
674724 | Once an incoming webhook connector is created in Microsoft Teams, this webhook URL can be used in an automation stitch under the action Microsoft Teams connector.
config system automation-action edit <action name> set action-type microsoft-teams-notification next end |
675049 | Add support for PRP (Parallel Redundancy Protocol) in NAT mode for a virtual wire pair. This preserves the PRP RCT (redundancy control trailer) while the packet is processed by the FortiGate. |
675200 | Improve SOCKS/SSH proxy to support internet-service . |
675401 | Provide options for controlling concurrent TCP/UDP connections by introducing a connection quota in the per-IP shaper and a port quota in the fixed port range type IP pool. |
675958 | A DNS health check monitor can be configured for server load balancing. The monitor uses TCP or UDP DNS as the probes. The request domain is matched against the configured IP address to verify the response.
config firewall ldb-monitor edit <name> set type dns set port <string> set dns-protocol {udp | tcp} set dns-request-domain <string> set dns-match-ip <class_ip> next end |
676063 | Add support for OCI IMDSv2 that offers increased security for accessing instance metadata compared to IMDSv1. IMDSv2 is used in OCI SDN connectors and during instance deployments with bootstrap metadata. |
676260 | FortiGates with a premium subscription (AFAC contract) for cloud-based central logging and analytics are able to send traffic logs to FortiAnalyzer Cloud, in addition to UTM logs and event logs. FortiGates with a standard FortiAnalyzer Cloud subscription (FAZC contract) can send UTM and event logs only. |
676484 | When configuring the generic DDNS service provider as a DDNS server, the server type and address type can be set to IPv6. This allows the FortiGate to connect to an IPv6 DDNS server and provide the FortiGate’s IPv6 interface address for updates.
config system ddns edit <name> set ddns-server genericDDNS set server-type {ipv4 | ipv6} set ddns-server-addr <address> set addr-type ipv6 {ipv4 | ipv6} set monitor-interface <port> next end |
676549 | The past seven-day hit count is displayed on the policy list page and the policy dialog page for IPv4 and IPv6 multicast policies. A seven-day bar chart for additional visualization of the statistics has been added. |
676577 | Introduce FortiGuard updates for OUI files used to identify device vendors by MAC address. This database is used in WiFi and device detection. |
677334 | Add support for MacOS Big Sur 11.1 in SSL VPN OS check. |
677672 | Support running both BYOL and on-demand type FGT-VMs on ARM-based Graviton2 EC2 instances on AWS. |
677750 | The Local Out Routing page consolidates features where a source IP and an outgoing interface attribute can be configured to route local out traffic. The outgoing interface has a choice of Auto, SD-WAN, or Specify to allow granular control over the interface in which to route the local out traffic. Local Out Routing must be enabled from System > Feature Visibility, and it supports multi-VDOM mode. |
677784 | Add commands to debug traffic statistics for traffic monitor interfaces (interface ), interface traffic in real-time data (peek ), and to dump interface traffic history data (history ):
# diagnose debug traffic {interface | peek | history} |
678783 | Add option for users to set a non-default SD-WAN member zone for OCVPN IPsec interfaces. The sdwan-zone option is only available if SD-WAN is enabled. sdwan-zone references the entries in the SD-WAN configuration, and the default is virtual-wan-link .
config vpn ocvpn ... set sdwan enable set sdwan-zone {virtual-wan-link | <zone> | ...} ... end |
679175 | Add interface-select option for email-server .
config system email-server set interface-select-method {auto | sdwan | specify} set interface <interface> end |
680599 | Increase the ICMP rate limit to allow more ICMP error message to be sent by the FortiGate per second. The ICMP rate limit has changed from 1 second (100 jiffies) to 10 milliseconds (1 jiffy). |
681600 | Add support for syslog RFC 5424 format, which can be enabled when the syslog mode is UDP or reliable.
config log syslogd setting set format {default | csv | cef | RFC5424} end |
682106 | If a FortiCloud account has a FortiManager Cloud account level subscription (ALCI), a FortiGate registered to the FortiCloud account can recognize it and enable FortiManager Cloud central management. |
682480 | Flow-based SIP inspection is now done by the IPS engine. Proxy ALG features that are supported in flow mode include blocking scenarios, rate limitation, and malformed header detection. Inspection mode is selected at the firewall policy level. |
683791 | From the CLI, users are allowed to enable malware threat feeds and outbreak prevention without performing an AV scan. In the GUI and CLI, users can choose to use all malware thread feeds, or specify the ones they want to use. New replacement message for external block lists have been added.
config antivirus profile edit <name> config http set av-scan {disable | block | monitor} set outbreak-prevention {disable | block | monitor} set external-blocklist {disable | block | monitor} set quarantine {enable | disable} end set outbreak-prevention-archive-scan {enable | disable} set external-blocklist-archive-scan {enable | disable} set external-blocklist-enable-all {enable | disable} set external-blocklist <source> next end Note that the |
684133 | Support site-to-site IPsec VPN in an asymmetric routing scenario with a loopback interface as a VPN bound interface.
config vpn ipsec phase1-interface edit <name> set interface "loopback" set loopback-asymroute {enable | disable} next end |
687282 | When FortiGuard DDNS is configured as a DDNS server, the server type and address type can be set to IPv6. This allows the FortiGate to connect to FortiGuard over IPv6 and provide the FortiGate’s IPv6 interface address for updates. |
689140 | FortiAI can be added to the Security Fabric so it appears in the topology views and the dashboard widgets. |
689150 | When the detect server becomes unavailable in a link monitoring configuration, instead of removing all routes associated with the gateway and interface defined in the link monitor, only remove specific routes. These subnets can be specified in the link-monitor configuration.
config system link-monitor edit <id> set srcintf <interface> set server <server IP> set gateway-ip <gateway IP> set route <subnet 1> ... <subnet n> next end |
689174 | Adds support for Layer 3 unicast standalone config sync . This allows peers to be synchronized in cloud environments that do not support Layer 2 networking, which expands support for auto-scale scenarios. Configuring a unicast gateway allows peers to be in different subnets altogether (this is an optional setting).
config system ha set unicast-status enable set unicast-gateway <address> config unicast-peers edit 1 set peer-ip <address> next ... end end |
690179 | The SD-WAN REST API for health-check and sla-log now exposes ADVPN shortcut information in its result. The child_intfs attribute returns the statistics for the corresponding shortcuts. The following command displays real-time SLA information for ADVPN shortcuts:
|
690688 | Add UX enhancements:
|
690691 | The radio transmit power can now be configured in dBm or as a percentage in FortiAP profiles and override settings. |
690801 | FortiDeceptor can be added to the Security Fabric so it appears in the topology views and the dashboard widgets. |
691340 | DHCP address enforcement ensures that clients who connect must complete the DHCP process to obtain an IP address; otherwise, they are disconnected from the SSID. This prevents users with static addresses that may conflict with the DHCP address scheme, or users that fail to obtain a DHCP IP assignment to connect to the SSID. |
691411 | Ensure EMS logs are recorded for dynamic address related events under Log & Report > Events > SDN Connector Events logs:
|
691676 | Wireless controller now supports NAC profiles to onboard wireless clients into default VLANs. It can also apply NAC policies to match clients based on device properties, user groups or EMS tags, and assign clients to specific VLANs. VLAN sub-interfaces based on the VAP interfaces are used for the VLAN assignment. |
691902 | Support pulling malware threat feeds from FortiClient EMS, which in turn receives malware hashes detected by FortiClients. The malware hash can be used in an antivirus profile when AV is enabled with block or monitor actions. |
693799 | Add the following enhancements for voice-enterprise SSID:
|
694148 | Support file filter profile in a one-arm sniffer policy in the GUI and CLI. |
695259 | Adds support for DNS over TLS (DoT) and DNS over HTTPS (DoH) in DNS inspection. Prior to 7.0, DoT and DoH traffic silently passes through DNS proxy. In 7.0, WAD is able to handle DoT and DoH, and redirect DNS queries to the DNS proxy for further inspection.
config firewall ssl-ssh-profile edit "dot-deep" config dot set status deep-inspection set client-certificate bypass set unsupported-ssl-cipher allow set unsupported-ssl-negotiation allow set expired-server-cert block set revoked-server-cert block set untrusted-server-cert allow set cert-validation-timeout allow set cert-validation-failure block end next end |
695855 | In the wireless controller settings, add options to specify the delimiter used for various RADIUS attributes for RADIUS MAC authentication and accounting. The options are hyphen, single-hyphen, colon, or none.
config wireless-controller vap edit <name> set mac-username-delimiter {hyphen | single-hyphen | colon | none} set mac-password-delimiter {hyphen | single-hyphen | colon | none} set mac-calling-station-delimiter {hyphen | single-hyphen | colon | none} set mac-called-station-delimiter {hyphen | single-hyphen | colon | none} set mac-case MAC {uppercase | lowercase} next end |
695983 | In a scenario where a tunnel mode SSID or a VLAN sub-interface of an SSID is bridged with other interfaces via a software switch, support is added to allow captive portal authentication on the SSID or VLAN sub-interface. This requires that intra-switch-policy is set to explicit from the CLI when the switch interface is created. Users accessing the SSID will be redirected to the captive portal for authentication. |
698462 | Add the ability to perform SD-WAN passive WAN health measurement, which reduces the amount of configuration required and decreases the traffic that is produced by health check monitor probes doing active measurements. The passive and prefer-passive detection modes rely on session information captured in firewall policies with passive-wan-health-measurement enabled.
config system sdwan config health-check edit <name> set detect-mode {active | passive | prefer-passive} next end end config firewall policy edit <id> set passive-wan-health-measurement {enable | disable} next end |
699161 | Allows service assurance management (SAM) mode to be configured from the CLI, where a radio is designated to operate as a client and perform tests against another AP. Ping and iPerf tests can run on an interval and the results are captured in the Wi-Fi event logs. This allows the FortiGate to verify and assure an existing Wi-Fi network can provide acceptable services. |
701185 | Support DoT and DoH in explicit mode, where FortiGate acts as an explicit DNS server listening for DoT and DoH requests. Add support for local-out DNS traffic over TLS and HTTPS. |
705248 | The new GUI retro theme showcases a style of FortiOS giving homage to FortiOS 3.0. To enable it, go to System > Settings. Under View Settings, for Theme, select FortiOS v3 Retro. |
Rozwiązane problemy:
Anti Spam
Bug ID | Description |
---|---|
650160 | When using email filter profile, emails are being queued due to IMAP proxy being in stuck state. |
Anti Virus
Bug ID | Description |
---|---|
524571 | Quarantined files cannot be fetched in the AV log page if the file was already quarantined under another protocol. |
560044 | Secondary device blades occasionally report critical log event Scanunit initiated a virus engine/definitions update . Affected models: FG-5K, 6K, and 7K series. |
683835 | Files fail to open in some CIFS setups where FortiOS cannot generate a signature. |
Application Control
Bug ID | Description |
---|---|
576727 | Unknown Applications category is not present in NGFW policy-based mode. |
Data Leak Prevention
Bug ID | Description |
---|---|
616918 | DLP cannot detect attached ZIP and PDF files when receiving emails via MAPI over HTTPS. |
DNS Filter
Bug ID | Description |
---|---|
649985 | Random SDNS rating timeout events on 6K/7K SLBC with FGSP. |
653581 | Cannot pass DNS traffic through FortiGate or DNS traffic originated from FortiGate when external blocklist (threat feed) is updated. |
674302 | Do not send FortiGate generated DNS response if no server response was received and redirect DNS queries time out. |
682060 | DNS proxy is holding 60% memory caused by retransmitted DNS messages sent from DNS clients, which causes the FortiGate to enter conserve mode. |
693551 | DNS filter is not working on active VDOM in second HA unit in virtual cluster environment. |
Endpoint Control
Bug ID | Description |
---|---|
664654 | EMS host tags are not synced with the FortiGate when the user connects to a tunnel mode SSID. |
Explicit Proxy
Bug ID | Description |
---|---|
607230 | Percent encoding is not converted in FTP over HTTP explicit proxy. |
639092 | Web proxy forward server allows empty string for monitor option when health check is enabled. |
642196 | Web proxy forwarding server health check does not send user name and password. |
654455 | Proxy policy destination address set to none allows all traffic. |
662931 | Browsers change default SameSite cookie settings to Lax , and Kerberos authentication does not work in transparent proxy. |
664380 | When configuring explicit proxy with forward server, if ssl-ssh-profile is enabled in proxy-policy , WAD is unable to correctly learn the destination type correctly, so the destination port is set to 0, but the squid proxy server does not accept the request and returns an error. |
664548 | When the FortiGate is configured as an explicit proxy and AV is enabled on the proxy policy, users cannot access certain FTP sites. |
681054 | Web proxy users are disconnected due to external resource update flushing the user even if they do not have an authentication rule using the related proxy address or IP list. |
681969 | FSSO explicit proxy authentication appears as basic instead of FSSO. |
689002 | Proxy traffic failed after modifying resource setting in external connector. |
697836 | Performance issue when transferring data over FortiGate explicit proxy using fast match feature. |
707832 | WAD crashes each time when setting the access proxy VIP to the destination address of the explicit web proxy. |
File Filter
Bug ID | Description |
---|---|
676485 | File filter rule set with the msc file type was removed after upgrading. |
Firewall
Bug ID | Description |
---|---|
230997 | Do not allow match-vip in firewall policies when the action is set to accept. |
586995 | Cluster VDOM policy statistics data is not correct when VFID is different for same VDOM on primary/secondary. |
612371 | The captive-portal-exempt policy option does nit work for IPv6 traffic in a new firewall policy. |
635074 | Firewall policy dstaddr does not show virtual server available based on virtual WAN link member. |
650867 | Firewall does not track UDP sessions on the same port. |
653828 | When web filter and application control are configured, blocked sessions to play.google.com remain in the session table for 3600 seconds. |
659142 | TNS connection request limited to 500 per second when client is trying to reach database server through the firewall. |
659650 | DSCP marking on traffic-shaper /per-ip-shaper failed to mark corresponding IPv6 packets. |
660461 | Configuration changes take a long time, and ipsmonitor and cmdbsrv processes go up to 100% of CPU in a large, complex configuration. |
661014 | FortiCarrier has GTP drop packet log after configuring GTP allow list. |
661777 | Source NAT port reuses ports too quickly, and GCP/API fails to establish due to endpoint independence conflict. |
663062 | Sessions are marked dirty when IPsec dialup client connects/disconnects and policy routes are used. |
665739 | HTTP host virtual server does not work well when real server has the same IP but a different port. |
665964 | In NAT64 scenario, ICMPv6 Packet too big message translated to ICMPv4 does not set the MTU/DF bit correctly. |
666612 | Get internet service name configuration error on version 7.01011 when FortiGate reboots or upgrades. |
667277 | Support using a zone as an external interface of a VIP. |
667696 | Reputation settings in policies are not working when reputation-minimum is set and no source/destination address is set. |
667772 | When NGFW mode is policy-based and the security policy is configured, the quard daemon should start when one of the following profiles is enabled: anti virus, web filter, application control, IPS, or DLP. |
669665 | All ISDB groups are lost when upgrading from 6.2.5 to 6.4.2. |
675353 | Security policy (NGFW mode) flow-based UTM logs are still generated when policy traffic log is disabled. |
675821 | In firewall policies, the configuration order of NAT commands is not correct. |
676503 | The central SNAT map does not work in policy-based NGFW mode. |
678813 | Cannot change the order of IPv4 access control list entries from FortiOS after upgrading from 6.4.1. to 6.4.3. |
682956 | ISDB is empty/crashes after upgrading from 6.2.4/6.2.5 to 6.2.6. |
683426 | No hit counts on policy for DHCP broadcast packets in transparent mode. |
683604 | When changing a policy and creating a firewall sniffer concurrently, there is traffic that is unrelated to the policy that is being changed and matching the implicit deny policy. Some IPv4 firewall policies were missing after the change. |
683669 | Firewall schedule settings are not following daylight saving time. |
694284 | In transparent mode when HA is enabled, if the packet passes through the FortiGate more than once time, the MAC address could be different from main session. |
699785 | The performance will drop heavily when there are more than 3000 VIPs. |
FortiView
Bug ID | Description |
---|---|
628225 | FortiView Compromised Hosts dashboard cannot show data if FortiAnalyzer is configured using the FQDN address in the log setting. FortiAnalyzer configured with an IP address does not have this issue. |
643198 | Threats drilldown for Sources, Destinations, and Country/Region (1 hour, 24 hours, 7 days) gives the error, Failed to retrieve FortiView data. |
673225 | FortiView Top Traffic Shaping widget does not show data for outbound traffic if the source interface’s role is WAN. Data is displayed if the source interface’s role is LAN, DMZ, or undefined. |
683413 | Some FortiView pages/widgets fail to query data from FortiAnalyzer Cloud if the local FortiAnalyzer is not enabled.
Affected pages/widgets: Compromised Hosts, FortiView Cloud Applications, FortiView VPN, FortiView Web Categories, Top Admin Logins, Top Endpoint Vulnerabilities, Top Failed Authentication, Top System Events, Top Threats, Top Threats – WAN, and Top Vulnerable Endpoint Devices. |
683627 | FortiView has no data when FortiAnalyzer Cloud is the data source. |
GUI
Bug ID | Description |
---|---|
446427 | Using the GUI to update a VDOM license fails when the new license has a lower VDOM count than the current license. |
490396 | Account profile permission override and RADIUS VDOM override features do not work with two-factor authentication for remote admin login via GUI. The feature still works when the admin login is via SSH. |
547123 | The help message for gui-dynamic-profile-display is not correct. |
561420 | On Traffic Shaping Policy list page, right-click option to show matching logs does not work. |
561889 | When creating a firewall with an invalid subnet mask, an error is not generated. |
567996 | Slow load times for the Managed FortiSwitch and FortiSwitch Ports pages when there is a large number of FortiSwitches. |
588159 | When disabling Allow Endpoint Registration on the VPN Creation Wizard, the action succeeds, but the error Unable to setup VPN is incorrectly displayed. |
589749 | Incorrect error message on log settings page, Connectivity issue, 0 logs queued, for FortiAnalyzer connection when the VDOM is in transparent mode with log setting override enabled. |
592854 | An address created by the VPN wizard cannot save changes due to an incorrect validation check for parentheses, (), in the Comments field. |
599815 | Support inspecting username (email address) in case-insensitive format. |
602102 | Warning message is not displayed when a user configures an interface with a static IP address that is already in use. |
606814 | When creating a profile group with an SSL/SSH profile of no-inspection, the profile group correctly displays this, but when you edit the profile, certificate-inspection is displayed. |
612066 | GUI does not allow user to select SSL VPN tunnel when configuring Multicast routing. |
634550 | GARP is not sent when using the GUI to move a VDOM from one virtual cluster to another. GARP is sent when using the CLI. |
636208 | On SD-WAN Rules page, the GUI does not indicate which outgoing interface is active. This is due to auto-discovery VPN routing changes. |
638752 | FortiGates in an HA A-P configuration may lose GUI access to the HA secondary device after a period of 8 days of inactivity, when at least one static IPv6 address is configured on an interface. |
645441 | FortiAnalyzer Cloud card on the Fabric Connectors page shows a connected icon when it is not connected. |
645606 | GUI does not allow users to select SD-WAN as a destination interface in an SSL VPN policy while CLI does. |
650307 | GUI does not show the configured external FortiGuard category in the SSL-SSH profile’s exempt list. |
650708 | When the client browser is in a different time zone from the FortiGate, the Guest Management page displays an incorrect expiry time for guest users. The CLI returns the correct expiry. |
651711 | Unable to select an address group when configuring Source IP Pools for an SSL VPN portal. |
652522 | When performed from the primary FortiGate, using the GUI to change a firewall policy action from accept to deny does not disable the IP pool setting, causing the HA cluster to be out of sync. Updating the policy via the CLI does not have this issue. |
652975 | Cannot access FortiGate GUI over IPv6 after configuring IPv6 for the first time. |
653240 | When refreshing the FortiGuard page, connectivity status for Web Filtering and Anti-Spam incorrectly changes from up to down. |
653422 | When VDOM is enabled, the GUI cannot be used to edit a remote user group from within the Administrators dialog. |
654018 | When there are more than 600 quarantined IP addresses, the Quarantine Monitor (GUI and CLI) will not properly display them. |
654156 | When editing CLI objects that have an mkey ending with an „/.”, the page is either stuck loading, shows a JS error, or shows a notification that the entry does not exist. |
654186 | The top charts of the Device Inventory Monitor dashboard are empty when the visualization is set to table view. |
654250 | Firewall users cannot change their password via web captive portal when password renewal is enforced by the firewall policy for remote users. |
654626 | Unable to change the action setting of Freeware and Software Downloads using the FortiGuard Category Based Filter of the DNS filter profile. |
654705 | Aggregated IPsec VPN interface shows as down when each member tunnel has phase 1 and phase 2 names that differ from each other. |
655255 | FortiGuard resource retrieval delay causes GUI pages to respond slowly. Affected pages include: Firewall Policy, Settings (log and system), Explicit Proxy (web and FTP), System Global, and System CSF. |
655568 | Users cannot deselect Administrative Access options for VLAN interfaces from the GUI; the CLI must be used. |
655891 | Web CLI console cannot load due to Connection lost if port 8080 is used (HTTP). |
656139 | When editing the Interface column from the Multicast Policy page, an empty column appears when the any entry is selected from Select Entries and applied. The same occurs from the NAT64 and NAT46 policy pages. |
656429 | Intermittent GUI process crash if a managed FortiSwitch returns a reset status. |
656599 | Automation CLI script should support setting an administrator profile context to restrict access. |
656668 | On the System > HA page, GUI tooltip for the reserved management interface incorrectly shows the connecting IP address instead of the configured IP address. |
656974 | ip6-mode was changed from delegated to static after the interface was edited from the GUI. |
657322 | For AV profiles, the outbreak-prevention setting on enabled protocols is not automatically configured when enabling Use External Malware Block List. |
657545 | Enabling the Dynamic Gateway toggle for a static route fails without warning when the configuration is incorrect. |
659490 | A remote certificate in VDOM mode that has no references cannot be deleted from the GUI. Removal is possible using the CLI. |
661582 | Date/Time filter does not work on FortiGate Cloud logs. |
662705 | REST API, api/v2/monitor/firewall/internet-service-details returns start_ip and end_ip in raw format instead of string format. |
662873 | Editing the LDAP server in the GUI removes the line set server-identity-check disable from the configuration. |
663351 | Connectivity test for RADIUS server using CHAP authentication always returns failure. |
663737 | Re-add the FortiView facets filtering bar to full screen or standalone mode. |
663818 | When filtering log view entries by IP address range, entries higher than the upper limit of the range are shown. |
663956 | Unable to load web CLI console for LDAP admin with a login name that contains a space. |
664007 | GUI incorrectly displays the warning, Botnet package update unavailable, AntiVirus subscription not found., when the antivirus entitlement is expiring within 30 days. The actual botnet package update still works within the active entitlement duration. |
665111 | There is no way to add a line break when using the GUI to edit the replacement message for pre_admin-disclaimer-text. One must use the CLI with the Shift + Enter keys to insert a line break. |
665444 | Log Details does not resize the log columns and covers existing log columns. |
665712 | When multiple favorite menus are configured, the new features video pops up after each GUI login, even though user previously selected Don’t show again. |
666857 | LDAP connectivity issue in transparent mode VDOM. |
666999 | When editing the Poll Active Directory Server page, the configured LDAP server saved in FSSO polling is not displayed. Users must use the CLI to modify the setting. |
668020 | Disclaimer users are not shown in the user monitor; they must be displayed in the CLI with diagnose firewall auth list . |
668470 | FortiGuard DDNS setting incorrectly displays truncated unique location and empty server selection after saving changes. |
672599 | After performing a search on firewall Addresses, the matched count over total count displayed for each address type shows an incorrect total count number. The search functionality still works correctly. |
672906 | GUI does not redirect to the system reboot progress page after successfully restoring a configuration. |
673478 | FortiView shows no data due to backend filtering error. |
673496 | When editing phase 2 configurations, clicking Complete Section results in a red highlight around the phase 2 configuration GUI box, and users cannot click OK to save configuration changes. |
680804 | SD-WAN default implicit rule shows the destination address as Route tag: undefined. |
680805 | The list of firewall schedules displays time based on the browser time, even though the global time preference is set to use the FortiGate system time. The Edit Schedule page does not have this issue. |
682008 | On the SSL-VPN Settings page, the option to send an SSL VPN configuration to a user for FortiClient provisioning does not support showing domain name for VPN gateway. |
682440 | In the Firewall Policy list, the tooltip for IP Pool incorrectly shows Port Block Allocation as being exhausted if there are expiring PBAs available to be reallocated. |
684076 | Erroneous duplication error displayed when creating a phase 2 with Named IPv6 Address set to all if there is already a phase 2 entry defined with Named IPv4 Address set to all. The CLI must be used for this configuration. |
684904 | When a FortiGate with VDOM and explicit proxy enabled has an access profile with packet capture set to none, administrators with this access profile are not able to create an explicit proxy policy. |
687303 | Unable to edit Fabric Connector on FortiGate in HA. |
688076 | The Firewall Address and Service pages cannot load on a downstream FortiGate if Fabric Synchronization is enabled, but the downstream FortiGate cannot reach the root FortiGate. |
688567 | Under Policy & Objects > Addresses, users are unable to save changes when enabling or disabling Fabric Sync for SSLVPN_TUNNEL_ADDR1. |
688994 | The Edit Web Filter Profile page incorrectly shows that a URL filter is configured (even though it is not) if the URL filter entry has the same name as the web filter profile in the CLI. |
689605 | On some browser versions, the GUI displays a blank dialog when creating custom application or IPS signatures. Affected browsers: Firefox 85.0, Microsoft Edge 88.0, and Chrome 88.0. |
693624 | Certificate details in the GUI no longer have values for validity (Valid From, Valid To). |
697667 | When the FortiGate is managed by FortiManager, an administrator that selects Login Read-Only is incorrectly allowed to select Update firmware in System > Firmware, browse for an image, and install it. |
704638 | Allow customers choose which format is used for the Date/Time column in the log viewer. |
HA
Bug ID | Description |
---|---|
421335 | Get one-time hasync crash when running HA scripts for FIPS-CC. |
540600 | The HA hello-holddown value is divided by 10 in the hatalk daemon, which makes the hello-holddown time 10 times less than the configuration. |
615001 | LAG does not come up after link failed signal is triggered. |
643958 | Inconsistent data from FFDB caused several confsyncd crashes. |
650624 | HA GARP sending was delayed due to lots of transceiver reading. |
653095 | Inband management IP connection breaks when failover occurs (only in virtual cluster setup). |
654341 | The new join-in secondary chassis failed to sync, while primary chassis has 6K policies in one VDOM. |
656988 | In an HA cluster, when a backup configuration file uses an automation stitch, the primary and secondary devices use the same file name in the script. This causes the secondary device’s configuration file to overwrite the primary device’s configuration file. |
657376 | VLAN interfaces are created on a different virtual cluster primary instead of the root primary do not sync. |
658839 | Cloning a policy from the CLI causes the HA cluster to get out of sync. |
662893 | HA cluster goes out of sync if SAML SSO admin logs in to the device. |
670331 | Management access not working in transparent mode cluster after upgrade. |
671288 | FortiGate in standalone mode has a virtual MAC address. |
675781 | HA cluster goes out of sync with new custom DDNS entry, and changes with respect to the ddns-key value. |
677246 | Unable to contact TACACS+ server when using HA dedicated management interface in 6.4.3. |
677552 | After two quick failovers, VPN does not work until rekey. |
678309 | Cluster is out of sync because of config vpn certificate ca after upgrade. |
680753 | admin-restrict-local feature does not work on management interface in HA cluster. |
682150 | Virtual MAC on interface does not change when VDOM is moved back from secondary vCluster to primary vCluster. |
690248 | Malicious certificate database is not getting updated on the secondary unit. |
692212 | The interfaces on NP6 platforms are down when doing a configuration revert in HA mode. |
693178 | Sessions timeout after traffic failover goes back and forth on a transparent FGSP cluster. |
693223 | hasync crashes with signal 11 in ha_same_fosver_with_manage_master . |
Intrusion Prevention
Bug ID | Description |
---|---|
638341 | In some cases, IPS fails to get interface ID information that would result in IPS incorrectly dropping the session during static matching. |
647568 | Got exec child 210 does not reply, skip it. output after adding application control and antivirus profiles in an IPS policy. |
660111 | SSL VPN web mode IPS detection with HTTP does not work, even though it works with HTTPS. |
668631 | IPS is constantly crashing, and ipshelper has high CPU when IPS extended database has too many rules (more than 256) sharing the same pattern. Affected models: SoC3-based FortiGates. |
671322 | IPS engine reloads, or FortiGate reboots and displays CMDB __bsearch_index() duplicate value insertion errors. |
678166 | TFTP upload not working when application control and ASIC offload are enabled. |
686301 | ipshelper CPU spikes when configuration changes are made. |
688888 | BZIP2 file including EICAR is detected in the original direction of the flow mode firewall policy even though scan-bzip2 is disabled. |
689259 | Flow-Based AV scanning does not send specific extension files to FortiSandbox. |
691395 | Signature false positives causing outage after IPS database update. |
694777 | Application, IPS, and AV databases and engines are not updated by scheduled updates if a security policy is used. |
IPsec VPN
Bug ID | Description |
---|---|
566076 | IKED process signal 11 crash in an ADVPN and BGP scenario. |
592361 | Cannot pass traffic over ADVPN if: tunnel-search is set to nexthop , net-device disable , mode-cfg enable , and add-route disable . |
638352 | In extreme situations when thousands of tunnels are negotiating simultaneously (IKEv2), iked process gets exhausted and stuck. |
639806 | User name log empty when IPsec dialup IKEv2 has client RSA certificate with empty subject. |
642543 | IPsec did not rekey when keylife expired after back-to-back HA failover. |
646012 | DHCP over IPsec randomly works when net-device is disabled. |
647285 | IKE HA sync IPsec SA fails on receiver when ESP null crypto algorithm is used. |
652774 | OCVPN spoke-to-spoke communication intermittently fails with mixed topology where spokes have one or two ISPs, but the hubs have two. |
655739 | local-gw is replaced with primary IP on a secondary device when the secondary IP is used as a local-gw . |
658215 | When the SA is about to expire, before it is removed it is not offloaded so the traffic may not go through. |
659442 | NP6Lite platforms may enter conserve mode because the get /put reference count for pinfo is not reasonable. When there is an inbound SA update, the old pinfo is not freed. |
659535 | Setting same phase1-interface in SD-WAN member and SD-WAN zone causes iked watchdog timeout. |
660472 | Could not locate phase 1 configuration for IPv6 dialup IPsec VPN. |
663648 | BGP over dynamic IPsec VPN tunnel with net-device enable not passing through traffic after rebooting. |
666693 | If NAT-T IP changes, the dynamic IPsec spoke add route entry is stuck on hub. |
667129 | In ADVPN with SLA mode, traffic does not switch back to the lowest cost link after its recovery. |
668554 | Upon upgrading to FortiOS 7.0.0, a device with IPsec configured may experience IKE process crashes when any configuration change is made or an address change occur on a dynamic interface. |
670025 | IKEv2 fragmentation-mtu option not respected when EAP is used for authentication. |
672925 | Traffic cannot pass through IPsec tunnel after being offload to NPU. |
673049 | FortiGate not sending its external interface IP in the IKE negotiation (Google Cloud Platform). |
673258 | FortiGate to Cisco IKEv2 tunnel randomly disconnects after rekey. |
675276 | Kernel panic occurs after OCVPN role changes. |
675838 | iked ignores phase1 configuration changes until the process restarts. |
684133 | Site-to-site IPsec VPN cannot establish in asymmetric routing scenario where the IPsec VPN bound interface is a loopback interface. |
690903 | ADVPN shortcut is flapping when spokes are behind one-to-one NAT. |
691178 | Exchanging IPs does not work with multiple dynamic tunnels. |
691878 | Creating or updating a user with two-factor authentication causes dialup VPN traffic to stop. |
694992 | Issue establishing IPsec and L2TP tunnel with Chromebook behind NAT. |
699834 | ESP errors are logged with incorrect SPI value. |
Log & Report
Bug ID | Description |
---|---|
570152 | Remove redundant override-setting.override attribute for logging. |
587916 | Logs for local-out DNS query timeout should not be in the DNS filter UTM log category. |
645914 | Move eventtime field to the beginning of the log to save performance on Splunk or other logging systems. |
647741 | On FG-60F, logging and FortiCloud reporting incorrect IPv6 bandwidth usage for sessions with NPU offload. |
650325 | miglogd crashes with signal 11. |
650886 | No log entry is generated for SSL VPN login attempts where two factor authentication challenge times out. |
654363 | Traffic log shows Policy violation for traffic hitting the allow policy in NGFW policy mode. |
658665 | Cannot retrieve logs from FortiAnalyzer on non-root VDOM. |
661040 | Cyrillic characters not displayed properly in local reports. |
667274 | FortiGate does not have log disk auto scan failure status log. |
667950 | IPS UTM log is missing msg= and attackcontext= TLV fields because the TLV buffer is full and not sent to miglogd. |
670741 | Unable to configure syslog filter data size more then 512 characters. |
675347 | In local log search, results returned immediately when there are checked logs. |
677540 | First TCP connection to syslog server is not stable. |
682374 | Traffic logs are not forwarded correctly to syslog server in CEF format. |
691728 | Traffic log missed for some UTM DLP logs. |
692237 | FortiOS is truncating the group field to 35 characters in traffic logs. |
696825 | In rare cases, reportd crashes when the number of items can be zero, but the pie chart is still generated successfully. |
702859 | Outdated report files deleted system event log keeps being generated. |
Proxy
Bug ID | Description |
---|---|
550350 | Should not be able to set inspection-mode proxy with IPS-enabled only policy. |
579902 | Proxy deep inspection fails if server chooses to sign with ECDSA-SHA1. |
619707 | When Kerberos (negotiate without NTLM) authentication method is used for web proxy user authentication, there may be a rare memory leak issue. This memory leak issue may eventually cause the FortiGate to go into conserve mode once it occurs after many users are authenticated by Kerberos repeatedly over time. |
632085 | When CIFS profile is loaded, using MacOS (Mojave 10.14) to access Windows 2016 SMB Share causes WAD to crash. |
633303 | SSO guest user group does not work in proxy policy to authenticate users. |
640488, 669736, 675480 | When URLs for block/allow/external resource are processed, the system might enter conserve mode when external resources are very big. |
648831 | WAD memory leak caused by Kerberos proxy authentication. |
653099 | Wildcard URL filter in proxy mode with ? and * not always handled properly. |
655356, 660857 | Proxy deep inspection fails if server uses TLS 1.3 cookies or record padding. |
656830 | FortiGate should be in SSL bypass mode for TLS 1.2 certificate inspection with client certificate request. |
657905 | Firewall policy with UTM in proxy mode breaks SSL connections in active-active cluster. |
658654 | Cannot access specific website using proxy-based UTM with certification inspection due to delays from the server in replying to ClientHello message when a second connection from the same IP is also waiting for ClientHello. |
661063 | If a client sends an RST to a WAD proxy, the proxy can close the connection to the server. In this case, the relatively long session expiration (which is usually 120 seconds by default) could lead to session number spikes in some tests. |
664737 | WAD crash with signal 11 (/bin/wad => wad_ui_diag_session_get ). |
666522, 666686 | Proxy mode is blocking web browsing for some websites due to certificate inspection. |
675343 | WAD crashes with transparent web proxy when connecting to a forward server. |
680651 | Memory leak when retrieving the thumbnailPhoto information from the LDAP server. |
681134 | Proxy-based SSL certification inspection session hangs if the outbound probe connection has no routes. |
682002 | An incorrect teardown logic on the WAD SSL port causes memory leak. |
682980 | Proxy deep inspection workaround needed for sites that require psk_key_exchange_modes. |
684168 | WAD process consumes memory and crashes because of memory leak when calling FortiAP API from WAD. |
691468 | WAD IPS crashes because task is scheduled after closing. |
693951 | Cannot access Java-based application in proxy mode. |
696541 | Mirroring decrypted SSL traffic is not designed to work on a virtual interface, so this configuration should not be allowed. |
REST API
Bug ID | Description |
---|---|
597707 | REST API /api/v2/monitor/firewall/security-policy adds UUID data for security policy statistics. |
658206 | New REST API POST /api/v2/monitor/vpn/ike/clear?mkey=<gateway_name> will bring down IKE SAs tunnel the same way as diagnose vpn ike gateway clear . |
663441 | REST API unable to change status of interface when VDOMs are enabled. |
686351 | Remove blocking call to AWS meta out of /api/v2/monitor/web-ui/state . |
Routing
Bug ID | Description |
---|---|
537354 | BFD/BGP dropping when outbandwidth is set on interface. |
579884 | VRF configuration in WWAN interface has no effect after reboot. |
585816 | SD-WAN route selection does not use the most specific route in the routing table when selecting the egress path. |
613716 | Local-out TCP traffic changes output interface when irrelevant interface is flapping and causes disconnections. |
628896 | DHCP relay does not match the SD-WAN policy route. |
641050 | Need support for SSL VPN web mode traffic to follow SD-WAN rules/policy route. |
654032 | SD-WAN IPv6 route tag command is not available in the SD-WAN services. |
655447 | BGP prefix lifetime resets every 60 seconds when scanning BGP RIB. |
659409 | FortiGate blocks IPv6 but allows IPv4 for traffic that looks asymmetric with asymroute is disabled. |
660285 | Editing an existing route map rule to add set-weight 0 results in unset set-weight behavior. |
660300 | Application vwl signal 11 (segmentation fault) received when HA receives 0 bytes of data. |
660311 | Application vwl signal 6 (aborted) received due to wrong memory allocation for SD-WAN service when creating an ADVPN shortcut. |
661769 | SD-WAN rule disappears when an SD-WAN member experiences a dynamic change, such as during a dynamic PPPoE interface update. |
662655 | The OSPF neighborship cannot be established; get MD5 authentication error when the wrong MD5 key is deleted after modifying the key. |
662696 | If a session is initiated from the server side, SD-WAN application control does not work as expected. |
662845 | HA secondary also sends SD-WAN sla-fail-log-period to FortiAnalyzer. |
663396 | SD-WAN route changes and packet drops during HTTP communication, even though preserve-session-route is enabled. |
666829 | The bfdd application crashes. |
667469 | SD-WAN members and OIFs keep reordering despite the health check status being stable in an HA setup. |
668218 | SD-WAN HTTP health check does not work for URLs longer than 35 characters. |
668592 | Incorrect default timers for BFD parameters, bfd-desired-min-tx and bfd-required-min-rx . |
668982 | Possible memory leak when BGP table version increases. |
670017 | FortiGate as first hop router sometimes does not send register messages to the RP. |
672061 | In IPsec topology with hub and ~1000 spokes, hundreds of spoke tunnels are flapping, causing BGP instability for other spokes. |
673603 | Only the interface IP in the management VDOM can be specified as the health check source IP. |
675442 | Weight-based load-balance algorithm causes local-in reply traffic egress from wrong interface. |
676685 | VRRP does not consider VRF when looking up destination in routing table. |
677201 | Route maps show unset attributes after upgrading from 6.4.2. |
677928 | SD-WAN with sit-tunnel as a member creates an unwanted default route. |
678819 | The preserve-route is kept in session states if the route is deleted and the egress interface changes. |
679175 | Email server local-out traffic should be controlled by SD-WAN services. |
680365 | BGP is choosing local route that should have been removed from the BGP network table. |
681433 | GRE local-out traffic is not following SD-WAN rules. |
684378 | Traffic is forwarded out to the wrong interface if an LTE interface is an SD-WAN member. The LTE interface may lose its SD-WAN flag during modem initialization. |
685871 | OSPFv3 routes are missing from routing table when unsetting or setting the ASBR table. |
688774 | The traffic is sent out from an interface in the default route table when using diagnose traffictest run . |
691660 | set match in community string not accepting four-byte AS. |
692241 | BGP daemon consumes high CPU in ADVPN setup when disconnecting after socket writing error. |
693238 | OSPF neighbor cannot form with spoke in ADVPN setup if the interface has a parent link and it is a tunnel. |
693496 | SD-WAN rules not working for FortiAnalyzer settings. |
696079 | config aggregate-address6 is not summarizing the aggregate route. |
697658 | FortiCloud activation does not honor the set interface-select-method command under config system fortiguard . |
698360 | OSPF area range routes lost during HA failover. |
698665 | Get iprope_in_check () check failed on policy 0, drop error on debug flow for CAPWAP/Nmap on port 5246 connecting to VRRP. |
700384 | Incorrect IP address is chosen as forward address by the FortiGate while generating an OSPF type 7 LSA. |
Security Fabric
Bug ID | Description |
---|---|
649344 | When viewing CSF child Dashboard > WiFi from parent FortiGate, GUI reports, Cannot read property 'spectrum_analysis’ of undefined. |
650724 | Invalid license data supplied by FortiGuard/FortiCare causes invalid warning in the Security Rating report. |
652737 | FortiGate does not send interface configuration to FortiIPAM. |
653368 | Root FortiGate fails to load Fabric topology if HA downstream device has a trusted device in both primary and secondary FortiGates. |
660250 | The ipamd process is causing high memory usage after a few days as the JSON was not freed. |
660624 | FortiAnalyzer Cloud should be taken into consideration when doing CLI check for CSF setting. |
662128 | Security Rating Summary trigger is not available in multi-VDOM mode. |
666242 | Automation stitch CLI scripts fail with greater than 255 characters; up to 1023 characters should be supported. |
669436 | Filter lookup for Azure connector in Subnet and Virtual Network sections only shows results for VMSS instance. |
673560 | Compromised host automation stitch with IP ban action in multi-VDOM setup always bans the IP in the root VDOM. |
686420 | Dynamic address resolution is lost when SDN connector sends sync.callback command to the FortiGate. |
690812 | FortiGate firewall dynamic address resolution lost when SDN connector updates its cache. |
SSL VPN
Bug ID | Description |
---|---|
548599 | SSL VPN crashes on parsing some special URLs. |
586035 | The policy script-src 'self' will block the SSL VPN proxy URL. |
598614 | When a group and a user-peer is specified in an SSL VPN authentication rule, and the same group appears in multiple rules, each group and user-peer combination can be matched independently. |
610995 | SSL VPN web mode gets error when accessing internal website at https://st***.st***.ca/. |
613733 | Access problem for website. |
615453 | WebSocket using Socket.IO could not be established through SSL VPN web mode. |
623379 | Memory corruption in some DNS callback cases causes SSL VPN crash. |
630068 | When sslvpn SSH times-out, a crash is observed when the SSH client is empty. |
630771 | SSL VPN rewrites the URL inside the emails sent in Outlook (webmail). |
637217 | Internal webpage, di***, is not loading in web mode. |
641379 | Internal SharePoint 2019 website cannot be accessed in SSL VPN web portal. |
642838 | Redirected URLs do not work in web mode for am***.com. |
645973 | Content from internal Microsoft Dynamics CRM cr***.local portal is not loading properly in SSL VPN web mode. |
646339 | SSL-SSH inspection profile changes to no-inspection after device reboots. |
648433 | Internal website loading issue in SSL VPN web portal for ca***.fr. |
649130 | SSL VPN log entries display users from other VDOMs. |
652070 | BMC Remedy Mid Tier 8.1 web application elements are not displayed properly in SSL VPN web mode. |
652880 | SSL VPN crashes in a scenario where a large number of groups is sent to fnbam for authentication. |
653349 | SSL VPN web mode not working for Ec***re website. |
655374 | SSL VPN web portal bookmark not loading internal web page after login credentials are entered. |
656208 | Users with explicit web proxy authentication lose their proxy authentication group. |
656557 | The map on the http://www.op***.org website could not be shown in SSL VPN web mode. |
657689 | The system allows enabling split tunnel when the SSL VPN policy is configured with destination all . It is not consistent with 5.6.x and 6.0.x. |
657890 | Internal website, https://*.da***.cz, is not working correctly in SSL VPN web mode due to source link error. |
658036 | When adding an FTP link to download FortiClient and accessing it through the portal, the colon is dropped from the string. |
659234 | FortiGate keeps replying to an ARP request for an IP address that was once assigned to an SSL VPN user, who has already disconnected and been deleted. |
659312 | Unable to load HTTPS bookmark in Safari (TypeError: 'text/html' ). |
659322 | SSL VPN disconnects all connections after adding new address to IP pool. |
659481 | Internal websites not displayed successfully in SSL VPN web portal. |
661290 | https://mo***.be site is non-accessible in SSL VPN web mode. |
661372 | SSL VPN incorrectly rewrites the script URL. |
661835 | ASUS ASMB9-iKVM application shows blank page in SSL VPN web mode. |
662042 | The https://outlook.office365.com and https://login.microsoft.com websites cannot be accessed in the SSL VPN web portal. |
662871 | SSL VPN web mode has problem accessing some pages on FortiAnalyzer 6.2. |
663298 | The internal website is not working properly using SSL VPN. |
663433 | SSL VPN web mode cannot open DFS shared subdirectories, get Invalid HTTP request error as sslvpnd adds NT . |
663723 | SSL VPN with user certificate and credential verification allows a user to connect with a certificate signed by a trusted CA that does not match the certificate chain of the configured CA in the user peer configuration. |
664121 | SCM VPN disconnects when performing an SVN checkout. |
664276 | SSL VPN host check validation not working for SAML user. |
664804 | User cannot use column header for data sorting (bookmark issue). |
665330 | SDT application can no longer load secondary menu elements in SSL VPN web mode. |
665408 | Occasionally, 2FA SSL VPN users are unable to log in when two remote authentication servers with the same IP are used. |
665879 | When sslvpn processes the HTTP/HTTPS response with content disposition, it will change the response body since the content type is HTML. |
666194 | WALLIX Manager GUI interface is not loading through SSL VPN web mode. |
666513 | An internal web site via SSL VPN web mode, https://***.46.19.****:10443, is unable to open. |
666855 | FortiOS supports verifying client certificates with RSA-PSS series of signature algorithms, which causes problems with certain clients. |
667780 | Policy check cache should include user or group information. |
667828 | SSL VPN web mode authentication problem when accessing li***.com. |
668574 | Unable to load a video in SSL VPN web mode. |
669144 | HTTPS access to ERP Sage X3 through web mode fails. |
669497 | Cannot view TIFF files in SSL VPN web mode. |
669506 | SSL VPN web mode cannot load web page https://jira.ca.ob***.com properly based on Jira application. |
669685 | Split tunneling is not adding FQDN addresses to the routes. |
669707 | The jstor.org webpage is not loading via SSL VPN bookmark. |
669900 | SSL VPN crash when updating the existing connection at the authentication stage. |
670042 | Internal website, http://si***.ar, does not load a report over SSL VPN web portal. |
670731 | Internal application server/website bookmark (https://***.***.***.***:****/nexgen/) not working in SSL VPN web mode. |
670803 | Internal website, http://gd***.local/share/page?pt=login, log in page does not load in SSL VPN web mode. |
672743 | sslvpnd segmentation fault crash due to old DNS entries in cache that cannot be released if the same results were added into the cache but in a different order. |
673320 | Pop-up window does not load correctly when accessing internal application at https://re***.wo***.nl using SSL VPN web mode. |
674279 | Customer cannot access SAP web GUI with SSL VPN bookmark. |
675196 | RTA login webpage is not displaying in SSL VPN web mode. |
675204 | JSON parse error returned SSL VPN web mode for website https://bi***.u***.cat/az.php. |
675878 | When matching multiple SSL VPN firewall policies, SSL VPN checks the group list from bottom to top, and the user is mapped to the incorrect portal. |
675901 | Internal website https://po***.we***.ac.uk is not loading correctly with SSL VPN bookmark. |
676345 | SSL VPN web mode is unable to open some webpages on the internal site, https://vi***.se, portal. |
676391 | set banned-cipher command does not work for TLS 1.3. |
676673 | Ciphers with ARIA, AESCCM, and CHACHA cannot be banned for SSL VPN. |
677167 | SSL VPN web mode has problem accessing Sapepronto server. |
677256 | Custom languages do not work in SSL VPN web portals. |
677548 | In SSL VPN web mode, options pages are not shown after clicking the option tag on the left side of the webpage on an OWA server. |
677550 | GUI issues on the internal Atlassian Jira web portal in SSL VPN web mode. |
678130 | Customer internal website, https://va***.do***.com:21108/mne, cannot be displayed correctly in SSL VPN web mode. |
678132 | SSL VPN web portal SSO credentials for alternative option are not working. |
678450 | Unable to view the management GUI of PaloAlto running on 8.1.16 in SSL VPN web mode. |
678996 | Customized replacement messages for SSL VPN login page sometimes cannot be parsed correctly, causing the FortiToken authentication page to not appear. |
679141 | Website https://we***.p*.cz is not working in SSL VPN web mode. |
680711 | Unable to access OWA web server on mobile device in SSL VPN web mode. |
680744 | Internal SolarWinds Orion platform’s webpages have issue in SSL VPN web mode. |
681424 | Unable to access sc***.com in SSL VPN web mode. |
681626 | Internal Gridbees portal does not display in SSL VPN web mode. |
681865 | Bookmark to web server http://hc***.hi***.st***.es/ is redirected to a direct URL and web socket fails to establish in SSL VPN web mode. |
683823 | Internal ADB Epicentro portal has issue in SSL VPN web mode. |
683963 | SSL VPN bookmark fails to authenticate user through single sign-on for internal website login. |
684012 | SSL VPN crashed with signal 11 (segmentation fault) uri_search because of rules set for a special case. |
684866 | Specific content in portal.ag***.com cannot be shown in SSL VPN web mode. |
685269 | SSL VPN web mode is not working properly for aw***.co***.com website. |
685854 | After SSL VPN proxy rewrite, some Salto JS files could not run. |
686425 | When accessing an application in SSL VPN web mode (Sage HR), images fail to load for http://S-***.ro***.de/mp***/. |
688023 | SSL VPN bookmarked website shows empty page after logging in to SSL VPN gateway https://vd***.vi***.com. |
688988 | An internal web site, http://ar***.ar***.be***.it/, is unable to load PDF document in SSL VPN web mode. |
689616 | When a client is connected to SSL VPN and has an internet outage for more then 15 seconds, the client fails to reconnect. |
689901 | SharePoint links (su***.com) not working properly on webpage launched by SSL VPN web portal. |
690217 | Unable to display the data in SSL VPN web mode on innovaphone PBX link. |
690282 | Access through web portal to an Opengear Lighthouse server does not load the login page properly. |
690507 | SSO login for the bookmark to access FortiAnalyzer GUI does not work. |
690686 | Certificate authentication does not check PKI users in the expected order. |
692107 | Unable to load webpage, https://ax.***.on***.sp***.com/namespaces/, in SSLVPN web mode. |
692326 | Get Entry not found error when editing address object members that contain interface-subnet address objects. |
693691 | VPN logs do not show any bandwidth utilization in SSL web tunnel statistics when only using RDP. |
694346 | Report section of internal web server (https://lm***.lm***.au***.vw***/ar***/) is not accessible via the SSL VPN web portal. |
694671 | PDF files on internal web server, https://co***.ag***.em***.vw***:8443, are not opening in SSL VPN web portal. |
695386 | SAML login failure when a user belongs to multiple groups associated with multiple VPN realms. |
695844 | In SSL VPN web mode, redirection inside bookmark re***.ce***.fi***br keeps loading. |
696009 | Tunnel IP pool leak when DTLS tunnel user session is deleted due to timeout (idle or authentication). |
697142 | SharePoint server (de***.sc***.gov.sa) is not working on web-based VPN. |
697336 | SSL VPN web mode cannot access https://em***.login.***.oraclecloud.com/. |
699619 | SSL VPN web mode fails to access to https://www.we***.org. |
700572 | SSL VPN web mode has problem accessing iDRAC9 server. |
700673 | Unexpected group to portal matching priority with SAML authentication. |
702493 | CMS URLs incorrectly rewritten by SSL VPN proxy in web mode. |
705695 | OS check for SSL VPN tunnel is not working on macOS Big Sur; the connection is rejected when the action is set to allow. |
706067 | PatientFocus has style issues in SSL VPN web mode. |
706232 | An internal web portal http://sr***/li***/ does not load properly in SSL VPN web mode. |
Switch Controller
Bug ID | Description |
---|---|
649913 | HA cluster not synchronizing when configuring an active LACP with MCLAG via FortiManager. |
671135 | flcfg crashes while configuring FortiSwitches through FortiLink. |
686031 | LLDP updates from FortiSwitch can cause flcfgd to leak memory. |
686325 | High rate of LLDP traffic can cause flcfgd to get stuck in Z state and halt FortiSwitch configuration synchronization. |
690904 | Unable to de-autorize FortiSwitch, or assign VLAN on FortiSwitch port on a tenant VDOM. |
691985 | L3 managed FortiSwitch configuration synchronization error due to the empty string parameter in ptp-policy on managed port configuration. |
696405 | disable-discovery of a FortiSwitch on one VDOM should not make the FortiSwitch disconnect from another VDOM. |
700310 | When managed switch PTP policy and settings configuration was pushed as part of initial FortiLink configuration, the FortiLink connection is in an error state. |
700842 | FortiSwitch MAC delete logs are not being generated. |
System
Bug ID | Description |
---|---|
464340 | EHP drops for units with no NP service module. |
495532 | EHP drop improvement for units with no NP service module. |
521213 | Read-only administrators should be able to run diagnose sniffer packet command. |
572038 | VPN throughput dropped from 1 Gbps to 40 Mbps when FEC is enabled. |
578241 | 3DES and SHA1 should not be included in strong crypto list. |
582536 | Link monitor behavior is different between FGCP and SLBC clusters. |
585882 | Error in log, msg="Interface 12345678001-ext:64 not found in the list!" , while creating a long name VDOM in FG-SVM. |
598464 | Rebooting FG-1500D in 5.6.x during upgrade causes an L2 loop on the heartbeat interface and VLAN is disabled on the switch side. |
606360 | HQIP loopback test failed with configured software switch. |
616576 | DoS log counters are inaccurate (policy counters, event log entries, packet counts). |
623775 | newcli daemon crash due to FortiToken Mobile user token activation email processing. |
627236 | TCP traffic disruption when traffic shaper takes effect with NP offloading enabled. |
628642 | Issue when packets from the same session are forwarded to each LACP member when NPx offloading is enabled. |
630861 | Support FortiManager when private-data-encryption is enabled in FortiOS. |
631132 | Symantec connector does not work if management VDOM is not root vdom and root VDOM has no network connection. |
631689 | FG-100F cannot forward fragmented packets between hardware switch ports. |
633827 | Errors during fuzzy tests on FG-1500D. |
634202 | STP does not work in transparent mode. |
634929 | NP6 SSE drops after a couple of hours in a stability test. |
636999 | LTE does not connect after upgrading from 6.2.3 on FG-30E-3G4G models. |
642005 | FortiGate does not send service-account-id to FortiManager via fgfm tunnel when FortiCloud is activated directly on the FortiGate. |
643033 | get system interface transceiver port1 should return RX power and TX power for all Ch0[1-4] with a 0 value or N/A when the admin port is down on one side and the link status is down. |
644380 | FG-40F/60F kernel panic if upgrading from 6.4.0 due to configuration file having a name conflict of fortilink as both aggregate interface and virtual switch name. |
645241 | LACP failed to process traffic after adding new QSFP interfaces as LACP members even when the LACP status is up. |
648014, 661784 | FortiDDNS is unable to update the renewed public IP address to FortiGuard server in some error conditions. |
648083 | cmdbsvr may crash with signal 11 (segmentation fault) when frequently changing firewall policies. |
648085 | Link status on peer device is not down when admin port is set to down. |
648406 | Flow-based inspection with virtual wire pair causes MAC to flap. |
649937 | The diagnose geoip geoip-query command fails when fortiguard-anycast is disabled. |
650411 | SSL local certificate can not be imported via CMDB API (api/v2/cmdb/vpn.certificate/local ) due to certificate data handling in CMF plugin (vpn.certificate/local ). |
651103 | FG-101F crashed and rebooted when adding vlan-protocol 8021ad VLAN. |
651420 | Add support for interface-shaping-offload under system npu on SoC3 and SoC4 models. |
652478 | Get application cmdbsvr signal 11 crash log several times. |
654131 | No statistics for TX and RX counters for VLAN interfaces. |
654159 | NP6Xlite traffic not sent over the tunnel when NPU is enabled. |
654424 | FortiGate sends incorrect static route updates to FortiManager when using dedicated management interface. |
655555 | Unable to sniff LLDP frames on management and TFTP ports. |
656690 | Curaçao is not listed in the database when registering the FortiGate via the dashboard. |
656983 | MIB OID fgSysLowMemUsage returns value for devices where it is not applicable. |
657629 | ARM-based platforms do not have sensor readings included in SNMP MIBs. |
657632 | IPv6 passes though the DNS filter with application control enabled. |
659539 | FortiGate running 7.0.0 cannot validate license via FortiManager due to FortiManager hardware missing Fortinet_CA2 and Fortinet_SUBCA2001. |
660441 | When a PPPoE interface is enabled, it overwrites the LAN address object that was created. |
660709 | The sflowd process has high CPU usage when application control is enabled. |
661450 | Another application VWL signal 6 (Aborted) received appears. |
662239 | FGR-60F-3G4G hardware switch span does not work. |
662681 | Policy package push from FortiManager fails the first time, and succeeds the second time if it is blank or has no changes. |
662687 | Asynchronous SDK call may take a long time and cause HA A-P to have Kernel panic - not syncing error. |
663083 | Offloaded traffic from IPsec crossing the NPU VDOM link is dropped. |
663815 | Low IPS HTTP throughput on SoC4 platforms. |
663826 | Fortinet Factory certificate key integrity check failed in diagnose hardware certificate command. |
664268 | No filename setting on BOOTP response when option 67 is set on the DHCP server. |
664279 | snmpd crashes when sorting a list-based ARP table if it has about 50,000 or more entries. |
664478 | Kernel crash caused race condition on vlif accessing. |
665000 | HA LED off issue on FG-1100E/1101E models. |
665332 | When VDOM has large number of VIPs and policies, any firewall policy change causes cmdbsvr to be too busy and consume high CPU. |
665550 | Fragmented UDP traffic does not assemble on the FortiGate and does not forward out. |
666030 | Empty firewall objects after pushing several policy deletes. |
666205 | High CPU on L2TP process caused by loop. |
666210 | diagnose sys csum command shows wrong hash on SOC4 appliances (FG- 60F, FG-61F, FG-100F and FG-101F). |
666700 | In FIPS mode, ssh-cbc-cipher is disabled, but the FortiGate still responds with CBC cipher. |
666852 | FortiGate local-out system DNS traffic for host names lookup continuously generates timeout DNS log if the primary server cannot resolve them. |
667722 | VLAN interface created on top of a 10 GB interface is not showing the actual TX/RX counters. |
667962 | httpsd crashed and *** signal 6 (Aborted) received *** appears when loading configurations through REST API with interactions. |
668410 | NP6lite SoC3 adapter drops packets after handed from kernel. |
668856 | Offloaded traffic passing through two VDOMs connected with EMAC-VLANs is sometimes dropped. |
669914 | No statistics for TX and RX counters for VLAN interfaces. |
669951 | confsyncd may crash when there is an error parsing through the internet service database, but no error is returned. |
670838 | It takes a long time to set the member of a firewall address group when the member size is large. In the GUI, cmdbsvr memory usage goes to 100%. In the CLI, newcli memory usage goes to 100%. |
670962 | Packet loss occurs when traffic flow between VLAN interfaces is created under 10G LACP link. |
671643 | NTurbo does not work when enabled in IPsec tunnel or with session helper. |
671972 | If cfg-save is set to manual (under config system global ), it causes problems with the queries made when parsing the internet service database. |
672003 | Link status on peer device is not down when the admin port is down on the FortiGate. |
673263 | High memory issue is caused by heavy traffic on the VDOM link. |
673609 | The auto-join FortiCloud re-try timer 600 second value is too large. |
673918 | Read-only administrator with packet capture read-write permission cannot run diagnose sniffer command. |
675171 | L2TP with status set to enable should be configured before EIP and SIP. |
675418 | FortiManager CLI script for 2FA FortiToken mobile push does not trigger activation code email. |
675842 | Get Failed on update FortiGuardDDNS error for fortiddns when secondary device becomes primary device in an HA cluster. |
677263 | When changing the interface speed, some checking is skipped if it is set from FortiManager. |
677568 | Failed to parse execute restore config properly when the command is from a FortiManager script. |
677784 | Add diagnose debug traffic {interface | peek | history} command to debug interface bandwidth traffic. |
678469 | Configuration attribute field in system event logs has length limitation. |
678734 | GeoIP6 address causes policy to not install properly in the kernel. |
679114 | DHCP discover request is wrongly forwarded to all IPsec VPN interfaces when tunnel flipping occurs. |
680881 | Rebooting device causes interface mode to change from static to DHCP. |
681478 | After reboot, get global.system.interface.npu0_vlink0 config error when VDOM is in transparent mode. |
683284 | Configuration backup is possible via SCP with expired administrator password. |
686539 | Egress interface-based traffic shaping is not applied if the session is processed by NTurbo. |
687457 | dnsproxy process crashes with signal 11. |
687519 | Bulk changes through the CLI are very slow with 24000 existing policies. |
688316 | After upgrading from 6.4.2 to 6.4.4, some configurations moved to another VDOM. |
689873 | Sometimes a VWL service adds a child without a parent, leading to a signal 6 (Aborted) crash received at cmf_query_ses_update_child . |
690762 | Application lted signal 11 crash on FWF-40F-3G4G. |
691858 | The newcli process crashes or shows an error when creating a VIP with the same external interface IP but a different source address filter. |
692490 | When an <entry name> is on the same line as config <setting> <setting> <entry name> , it is not handled properly to send to FortiManager. |
692534 | allow-subnet-overlap setting not honored in NAT64 prefix configuration. |
694754 | Cloning a firewall policy may cause cmdbsvr to crash. |
696517 | NPU6 is not able to support WCCP traffic offloading. NTurbo driver received packet, which included additional IPv4 header and WCCP header. NTurbo is unable to process this kind of packets so it dropped. |
696836 | The OID structure was changed in 6.2.5; however, the MIB definitions for fgVpnTunEntry did not change and is causing errors. |
697303 | SNMP NULL hit counter for implicit deny policy (policy ID 0) is not sent. |
698014 | When running execute speed-test command, it shows all VLAN and SSL interfaces from other VDOMs. |
698204 | SNMP query for firewall policy statistics in non-root VDOM returns a 0 . |
700513 | 802.1x wiredap does not correctly process the TagID in the Tunnel-Private-Group-ID attribute. |
702932 | FG-1500D reboots suddenly after COMLog reported kernel panic and voipd is tainted. |
Upgrade
Bug ID | Description |
---|---|
656869 | FG-100F/101F may continuously boot upon upgrading from FortiOS 6.4.0. |
User & Authentication
Bug ID | Description |
---|---|
580391 | Unable to create MAC address-based policies in NGFW mode. |
633435 | FortiGate local FSSO agent replaces user login with same username and IP, which causes traffic sessions to be removed. |
643583 | radius-vdom-override and accprofile-override do not work when administrator has 2FA enabled. |
658228 | The authd and foauthd processes may crash due to crypto functions being set twice. |
658794 | FortiGate sent CSR certificate instead of signed certificate to FortiManager when retrieve is performed. |
659456 | REST API authentication fails for API user with PKI group enabled due to fnbamd crash. |
662391 | Persistent sessions for de-authenticated FSSO users. |
662404 | Wildcard LDAP users created on FortiToken Cloud have the first character of the username removed. |
663399 | interface-select-method not working for RADIUS configuration. |
663685 | The authd process truncates user names to a length of 35 characters (this breaks RADIUS accounting and logging for very long user names). |
664123 | Log enrichment for source and destination IP with RSSO user information in logs not properly working for IPv4 with framed route attribute in RADIUS accounting. |
665391 | The authd process gets stuck with high CPU due to slow route lookup when the routing table is big. FSSO stops processing new authentication events. |
666268 | The authd process may crash if the FSSO server connection is disconnected. |
667025 | FortiGate does not send LLDP PDU when it receives LLDP packets from VoIP phones. |
672289 | Group filter for diagnose firewall auth command does not work and displays other groups/users. |
675226 | The ssl-ocsp-source-ip setting not configurable in non-management VDOMs. |
675539 | FSSO collector status is down, despite that it is reported as connected by authd in a multi-VDOM environment. |
677535 | The radiusd process has a stale state after cluster members reboot. |
682139 | When multiple authentication methods are used in SSL VPN, authentication session terminates when RADIUS authentication enters error mode even when other methods like LDAP are queued. |
682394 | FortiGate is unable to verify the CA chain of the FSSO server if the chain is not directly root to FSSO endpoint. |
682966 | FortiGate is unable to parse IPv6 RADIUS accounting packet (Parse error: IP6 Prefix ). |
685727 | FortiTokens get activated by secondary node, causing token to be in an error state and token user assignment to fail. |
686437 | Policy-based authentication fails when the destination URL contains query parameters. |
688707 | Remote RADIUS administrators are unable to login to HA units using the HA management interface IP address in a multi-VDOM environment. |
688973 | OCSP verification fails with Can't convert OCSP rsp error after upgrading. |
690386 | FortiToken mobile activation is controlled by SD-WAN services, instead of honoring set interface-select-method command under config system fortiguard . |
VM
Bug ID | Description |
---|---|
587757 | Unable to deploy FG-VM image on AWS with additional HDD(st1) disk type. |
620654 | Spoke dialup IPsec VPN does not initiate connection to hub after FG-VM HA failover in Azure. |
641038 | SSL VPN performance problem on OCI due to driver. |
646161 | FG-VM8 does not recognize all memory allocated in Hyper-V. |
647800 | Merge FIPS ciphers to 6.4.3 and 7.0 trunk (visible to AWS and Azure only). |
656701 | FG-VMX service manager enters conserve mode; cmdbsvr has high memory utilization. |
657375 | Add logging for successful AWS HA failover actions. |
657785 | On FG-AWS, changing health check protocol to tcp-connect causes kernel panic and reboot. |
659333 | Slow route change for HA failover in GCP cloud. |
662969 | Azure SDN connector filter count is not showing a stable value. |
663276 | After cloning the OCI instance, the OCID does not refresh to the new OCID. |
663487 | Should add router policy in vdom-exception list. |
664312 | Support vfNIC driving for Broadcom 100G NIC. |
668131 | EIP is not updating properly on FG-VM Azure. |
669722 | Unable to import more than 50 groups from NSX-T SDN connector. |
669822 | Hot adding multiple CPUs at once to Xen-flavored VMs can result in a kernel panic crash. |
670166 | FG-VM64-KVM configuration revisions lost after upgrading from 6.2.5. |
671279 | FG-VM64-AZURE-PAYG license/serial number get lost after downgrading to 6.2.6 from 6.4.3. |
672312 | Azure SDN connector does not offer all service tags. |
672509 | OCI HA unable to handle cross-compartment failover. |
682420 | Dialup IPsec tunnel from Azure may not be re-established after HA failover. |
682561 | get system status output can be stuck getting the instance ID. |
682690 | Random dvfilterd crashes with signal 6. |
689239 | Azure route table is not using the proper subscription ID during failover. |
690863 | EIP is not updating properly with execute update-eip command in Azure with standard SKU public IP in some Canadian regions, like CanadaCentral and CanadaEast. |
695957 | Azure SDN connector gets an empty IP list when the REST API call fails, which results in IPsec connection being interrupted until the next SDN connector update succeeds (one-minute interval). |
698810 | Bootstrap does not work with FG-VM on Azure Stack. |
700381 | FG-VM kernel panicked and reboot after sending through IPv6 traffic. |
VoIP
Bug ID | Description |
---|---|
682983 | SIP ALG does not DNAT all IP addresses in the SIP response messages (route field). |
WAN Optimization
Bug ID | Description |
---|---|
686729 | Transparent mode configuration was not learned properly in 6.4. |
Web Application Firewall
Bug ID | Description |
---|---|
624452 | user-agent setting under config system external-resource does not accept XSS characters. |
Web Filter
Bug ID | Description |
---|---|
610553 | User browser gets URL block page instead of warning page when using HTTPS IP URL. |
654675 | Unable to get complete output of diagnose test application ipsufd 1 . |
655972 | Custom category action set to allow in web filter profile causes the URL to use the FortiGuard category rather than the custom category. |
661713 | Global web filter profile is not applied after changes to allowed/blocked categories. |
675436 | YouTube channel home page on blocklist is not blocked when directed from a YouTube search result. |
676403 | Replacement message pictures (FortiGuard web filter) are not displayed in Chrome. |
678467 | Safe search URL option is not working while the original query in Google Images has the same parameter name. |
WiFi Controller
Bug ID | Description |
---|---|
560038 | WiFi maps do not synchronize to HA FortiGate. |
609549 | In the CLI, the WTP profile for radio-2 802.11ac and 80 MHz channels does not match the syntax collection files. |
611986 | Bridge captive portal SSID has a new portal-type option, external-macauth , to support external Cisco ISE authentication. |
620764 | AP country and region settings are not updating as expected. |
621346 | Dynamic VLAN on SSID cannot pass traffic through FG-100F/101F and FG-60F/61F when offloading is enabled. |
625630 | FWF-60E hangs with looping kernel panic at WiFi driver. |
643854 | Client traffic was dropped by CAPWAP offloading when it connected from a mesh leaf Forti-AP managed by a FWF-61F local radio. |
647703 | HTTPS server certificate is not presented when WiFi controller feature is disabled in Feature Visibility. |
656804 | Spectrum analysis disable/enable command removed in CLI from wtp-profile and causing a bottleneck for APs, such as FAP-222C/223C at 100% CPU. |
657391 | FG-600E has cw_acd crash with *** signal 8 (Floating point exception) received *** in 6.2.4. |
660991 | FAP-U431F cannot view what channel is operating, and the override channel setting must be unset to change to a different channel. |
662714 | The security-redirect-url setting is missing when the portal-type is auth-mac . |
665766 | Client failed to connect SSID with WPA2-Enterprise and user group authentication. |
672136 | Log severity for wireless events in FortiWiFi and FortiAP should be reconsidered for CAPWAP teardown. |
672920 | CAPWAP tunnel traffic is dropped when offloading is enabled (with FAP managed by a VLAN interface). |
673211 | CAPWAP traffic drops on FG-300E when FortiAP is managed by VLAN interface. |
674342 | The cw_acd crashes after upgrading to 6.4.3 at cwAcLocal. |
676640 | cw_acd crash with *** signal 8 (Floating point exception) received *** after upgrading to 6.4.3. |
680503 | The current Fortinet_Wifi certificate will expire on 2021-02-11. |
680527 | Clients failing to authenticate to SSID due to MPSK client limit being reached when the actual connected clients are below the limit. |
686631 | Wireless country setting option needs to remove sanctioned countries and add missing countries. |
690483 | Wireless default WTP profile not synchronized between FWF-61E with HA A-A mode. |
Notatki producenta: FortiOS 7.0.0
Pozdrawiamy,
Zespół B&B
Bezpieczeństwo w biznesie