Resolved issues
The following issues have been resolved in FortiAP version 7.0.2. For inquiries about a particular bug, visit the Fortinet Support website.
Bug ID |
Description |
---|---|
421233 | FortiAP failed to disable wireless multimedia (WMM) setting in QoS profile. |
716641 | On local-standalone SSID, RADIUS authentication request was not sent to secondary RADIUS server when first one was unreachable. |
731369 |
Draeger M300 devices in Power Save mode would disconnect from FortiAP after a few hours. |
733260 |
Draeger Delta devices suffered from multicast packets loss for a long period of time. |
737343 |
FortiAP with location-based service enabled was reporting a specific client as both station and rogue AP. |
738596 |
FortiAP SSH server limited the credentialed scan performed with Nessus Scanner. |
743241 |
FortiAP mesh link dropped while using Cisco Webex/Telepresence devices. |
746769 |
Fixed
a Target Assert issue: |
754775 |
FortiAP might send corrupted IPv6 client information to FortiGate when reconnected. |
Common vulnerabilities and exposures
FortiAP 7.0.2 is no longer vulnerable to the following common vulnerabilities and exposures (CVE) references:
Bug ID |
Description |
---|---|
719016 |
FRAG attack:
|
Visit https://fortiguard.com for more information.