Known issues
The following issues have been identified in FortiGate-6000 and FortiGate-7000 FortiOS 7.0.14 Build 0226. For inquires about a particular bug, please contact Customer Service & Support. The Known issues described in the FortiOS 7.0.14 release notes also apply to FortiGate-6000 and 7000 FortiOS 7.0.14 Build 0226.
Bug ID |
Description |
---|---|
700630 |
Some GUI pages may randomly take longer to load than expected or not load at all. |
745799 |
The FortiView sessions pane fails to load. |
744071 |
FPC and FPM Session Rate dashboard widgets display correct session rates, but the accompanying graphs may be incorrect. |
782978 | When setting up a FortiGate-6000 or 7000 FGCP HA cluster, one of the FortiGates in the cluster may be running an older firmware version. During cluster formation, the newer firmware version is installed on FortiGate running the older firmware version. After the firmware is downloaded and before the FortiGate restarts, the console may display incorrect error messages. Even when these error messages appear the FortiGate should start up normally, running the newer firmware version, and should be able to join the cluster. |
785815 | An FPM may display an incorrect checksum message on the console while restarting. The FPM will continue to operate normally after fully starting. |
803082 |
Policy statistics data that appear on the GUI firewall policy pages and in FortiView may be incorrect. |
806304 |
The Packet capture GUI page needs to be manually refreshed for the cloned packet capture to be seen. The same issue is not observed with the create packet capture action. |
807425 |
After successfully resetting a managed FortiSwitich from the FortiGate-6000 or 7000 GUI, a Failed to factory reset FortiSwitich message may appear. |
813569 | Operating a FortiGate-6000 or 7000 as an SSL VPN client is not supported. |
840762 |
In some cases, the GUI will not display the Configuration Sync Monitor GUI page. You can work around this issue by stopping the You can use the following command to find the diagnose sys process pidof node The output of this command will be the diagnose sys kill 9 <node.js-process-number> |
860948 915952 |
Session and Session Rate dashboard widgets may display incorrect information. This can happen more commonly when the system is processing high traffic volumes. |
869454 |
In some IPsec configurations that include dynamic routing , the IP address of an IPsec interface can be set to 0.0.0.0. This happens if the IP address for the interface is received before the interface is up, so the interface address is not configured. You can work around this problem by flushing the tunnel using the IPsec interface that is not set up correctly. |
911668 |
Some processes on the secondary FortiGate 6000 or 7000 in an FGCP cluster may incorrectly generate arp requests. Since the secondary FortiGate 6000 or 7000 data interfaces are blocked, these arp requests do not reach any networks, but they can be seen from the CLI using diagnose commands. |
|
|
916717 700630 |
Some FortiGate 6000 or 7000 GUI pages may randomly take longer that expected to load. |
918795 |
After upgrading from FortiOS 7.0.10 to 7.0.12, the FPCs or the secondary FIM and the FPMs will appear to be running un-certified firmware. This also applies to the FPCs or the secondary FIM and the FPMs in the secondary chassis in an HA configuration. This problem occurs because of the way FortiOS 7.0.10 synchronized signatures from the management board to the FPCs or from the primary FIM to the secondary FIM and the FPMs during the firmware upgrade process. FortiOS 7.0.12 fixes signature handling, so you can resolve this problem by installing FortiOS 7.0.12 firmware a second time, using a normal firmware upgrade procedure. |
924059 |
Dashboard widgets in the Root VDOM does not show CPU/Memory/Session/Session Rate stats. You can work around this issue by adding dashboard widgets for specific FPCs or FPMs. |
919606 |
During a FortiGate-7000F firmware upgrade FPM CLI consoles may display messages similar to the following:
These messages are caused by timing issues as the FPMs are starting up. Once the FPMs have started they should operate normally. |
931711 |
From the FortiGate-6000 management board GUI, the Security Rating page may incorrectly flag firewall policies as Unused Policies, even though these policies have been processing traffic.This is happening because the management board Security Rating system is not receiving policy usage information from the FPCs. If you log into an FPC GUI, you can verify that the Security Rating page has not flagged the same policies as as unused policies. |
962951 |
Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.13 to 7.2.5 or 7.2.6. Upgrading the firmware of a FortiGate-6000 or 7000 FGCP HA cluster from 7.0.13 to 7.2.5 or 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for a few minutes. Before upgrading the firmware, disable |
951193 |
SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you can't create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x. If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis syncs its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version. You could also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x. For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement. |
958276 |
Due to known GUI performance issues, the HA dashboard widget may not always display some information and the information that appears on the widget may change randomly. |
987672 |
Fragmented packets with DEI == 1 are blocked |
988204 |
Some firmware upgrades fail because the BIOS security level is set to 1. You can fix the problem by setting the BIOS security level to 0. |
1011674 |
Upgrading a FortiGate 6000 or 7000 from FortiOS 7.0.14 to 7.2.8 is not supported because of an issue with the FortiOS 7.0.14 firmware. The same issue was present in FortiGate 6000 and 7000 FortiOS 7.2.8 build1639. This issue has been resolved with FortiGate-6000 and 7000 for FortiOS 7.2.8 build 8735, which is now available for download from the FortiOS 7.2.8 firmware folder on the Fortinet support site. FortiOS 7.0.14 firmware has not been fixed. Instead, Fortinet recommends not upgrading to FortiGate 6000 or 7000 for FortiOS 7.0.14. Either keep running FortiOS 7.0.13 or upgrade to 7.2.8. If you are already running FortiGate 6000 or 7000 for FortiOS 7.0.14, before upgrading to FortiOS 7.2.8 you should downgrade to FortiOS 7.0.13 and then upgrade to 7.2.8. Upgrading from FortiOS 7.0.13 to 7.2.8 is supported. This issue is caused by how FortiGate 6000 and 7000 FortiOS 7.0.14 interacts with the FortiGate security level. You can work around this issue by changing your FortiGate 6000 and 7000 security level. However, changing the security level is not recommended. Contact Fortinet Support for assistance. |
1093412 |
On the FortiGate 6000 and 7000 platforms, the |