Known issues
The following issues have been identified in FortiGate-6000 and FortiGate-7000 FortiOS 7.0.12 Build 0169. For inquires about a particular bug, please contact Customer Service & Support. The Known issues described in the FortiOS 7.0.12 release notes also apply to FortiGate-6000 and 7000 FortiOS 7.0.12 Build 0169.
Bug ID |
Description |
---|---|
700630 |
Some GUI pages may randomly take longer to load than expected or not load at all. |
724543 | Interface bandwidth dashboard widgets show incorrect outbound bandwidth usage. |
765407 |
Management interfaces on the secondary FIM in a FortiGate-7000F cannot be used for the FGSP heartbeat. |
782978 | When setting up a FortiGate-6000 or 7000 FGCP HA cluster, one of the FortiGates in the cluster may be running an older firmware version. During cluster formation, the newer firmware version is installed on FortiGate running the older firmware version. After the firmware is downloaded and before the FortiGate restarts, the console may display incorrect error messages. Even when these error messages appear the FortiGate should start up normally, running the newer firmware version, and should be able to join the cluster. |
785815 | An FPM may display an incorrect checksum message on the console while restarting. The FPM will continue to operate normally after fully starting. |
803082 |
Policy statistics data that appear on the GUI firewall policy pages and in FortiView may be incorrect. |
807425 |
After successfully resetting a managed FortiSwitich from the FortiGate-6000 or 7000 GUI, a Failed to factory reset FortiSwitich message may appear. |
813569 | Operating a FortiGate-6000 or 7000 as an SSL VPN client is not supported. |
830454 | Changing the FPC or FPM that an IPsec tunnel is using can cause traffic in the tunnel to be blocked. The problem is a timing issue, so sometimes traffic will be unaffected when making this configuration change and other times it may be blocked. If the traffic is blocked, you can manually bring the tunnel down and then back up to allow traffic to continue flowing. |
832353 | After factory resetting an FPM, if the configuration synchronized to it contains EMAC VLAN interfaces, the MAC addresses of the EMAC VLAN interfaces on the FPM may be different from the MAC addresses of the same EMAC VLAN interfaces on the primary FIM. The configuration synchronization checksum for the FPM is the same as for the other FPMs and FIMs, even though the EMAC VLAN interfaces have different MAC addresses. |
840762 |
In some cases, the GUI will not display the Configuration Sync Monitor GUI page. You can work around this issue by stopping the You can use the following command to find the diagnose sys process pidof node The output of this command will be the diagnose sys kill 9 <node.js-process-number> |
843473 |
The checksum of the root VDOM is missing from some parts of the output of the |
869454 |
In some IPsec configurations that include dynamic routing , the IP address of an IPsec interface can be set to 0.0.0.0. This happens if the IP address for the interface is received before the interface is up, so the interface address is not configured. You can work around this problem by flushing the tunnel using the IPsec interface that is not set up correctly. |
879106 |
FortiGate-6000 and 7000 do not support adding an EMAC VLAN interface to a VLAN interface. You can add an EMAC VLAN interface to a VLAN interface, but this could result in duplicate MAC addresses and duplicate HA virtual MAC addresses. |
881414 |
In some rare cases, an FPC or FPM may assign one or more FortiGate-6000 or FortiGate-7000 FIM network interfaces the HA virtual mac address 00:00:00:00:00:00. You can use the You can work around this issue by running the If the FortiGate-6000 or 70000 restarts or if you change the interface configuration (for example by changing the split interface configuration), the problematic HA virtual MAC address may revert to 00:00:00:00:00:00 and you will have to run the |
904810 |
The Session Rate dashboard widget may not load or may be showing session rate data. |
917146 |
From the Global GUI, the System > VDOM page does not display any information and a You can work around this issue by configuring VDOM properties from the CLI using the You can view the list of VDOMs from the CLI using the following command: config vdom edit ? You can add a new VDOM from the CLI using the following command: config vdom edit <vdom-name> You can delete a VDOM from the CLI using the following command: config vdom delete <vdom-name> |
918795 |
After upgrading from FortiOS 7.0.10 to 7.0.12, the FPCs or the secondary FIM and the FPMs will appear to be running un-certified firmware. This also applies to the FPCs or the secondary FIM and the FPMs in the secondary chassis in an HA configuration. This problem occurs because of the way FortiOS 7.0.10 synchronized signatures from the management board to the FPCs or from the primary FIM to the secondary FIM and the FPMs during the firmware upgrade process. FortiOS 7.0.12 fixes signature handling, so you can resolve this problem by installing FortiOS 7.0.12 firmware a second time, using a normal firmware upgrade procedure. |
919606 |
During a FortiGate-7000F firmware upgrade FPM CLI consoles may display messages similar to the following:
These messages are caused by timing issues as the FPMs are starting up. Once the FPMs have started they should operate normally. |
925690 |
The |
931711 |
From the FortiGate-6000 management board GUI, the Security Rating page may incorrectly flag firewall policies as Unused Policies, even though these policies have been processing traffic.This is happening because the management board Security Rating system is not receiving policy usage information from the FPCs. If you log into an FPC GUI, you can verify that the Security Rating page has not flagged the same policies as as unused policies. |
951135 |
Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.12 to 7.2.5. Upgrading the firmware of a FortiGate-6000 or 7000 FGCP HA cluster from 7.0.12 to 7.2.5 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for a few minutes. Before upgrading the firmware, disable |
951193 |
SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you can't create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x. If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis syncs its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version. You could also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x. For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement. |
1093412 |
On the FortiGate 6000 and 7000 platforms, the |