Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in Hyperscale firewall for FortiOS 6.2.9 Build 7197. For inquires about a particular bug, please contact Customer Service & Support. The Resolved issues described in the FortiOS 6.2.9 release notes also apply to Hyperscale firewall for FortiOS 6.2.9 Build 7197.

Bug ID

Description

662514

Improved handling of NAT46 traffic to prevent problems caused by the frame size increase resulting from converting an IPv4 packet to an IPv6 packet.

695803

Resolved an issue that prevented being able to change the order of DoS firewall policies from the GUI or CLI.

707298

Resolved an issue that would periodically cause the snmpd process to use excessive amounts of CPU time.

709046

Resolved an issue that could cause inaccurate statistics reporting when the FortiGate is processing a large number of sessions.

711135 722922

Resolved synchronization issues that caused various HA-related performance reductions or unexpected behavior.

712023 713415

Resolved an issue that prevented IPS from scanning traffic in a CAPWAP tunnel when DTLS and nTurbo is enabled.

712221

Resolved an issue that caused SSH management sessions to disconnect after entering the command diagnose traffictest set_pair aggregateInt.

713432 727173

Adjusted the CPU/Memory Performance Test threshold so that the test can find meaningful results, which are then displayed by the diagnose hardware test info command.

714198

Resolved an issue with how IPS re-directs NP7 offloaded sessions that can cause excess latency in transparent mode VDOMs. This issue could also block network backup traffic using port 1867.

714800

Resolved an issue that caused NPD process timeouts on the secondary FortiGate in an FGCP cluster after editing a hyperscale firewall policy and changing the CGN IP pool used in the policy.

714915

Changing the configuration of a hardware log server group assigned to a hyperscale firewall policy that is processing traffic no longer causes sessions accepted by the firewall policy to be dropped.

715090

Resolved an issue that prevented the FortiGate-2600F and 2601F from displaying the default fortilink interface on the GUI or CLI.

716094

Resolved an issue that could disrupt traffic when enabling per-IP traffic shaping and max-concurrent-session for a firewall policy with NP7 offloading enabled.

716169

SPF interfaces with speed set to 1000full no longer remain down after the system restarts.

716766 717564

Resolved synchronization issues that caused various HA-related performance reductions or unexpected behavior.

718713

Configuring an interface to drop fragmented packets (drop-fragment set to enable) now works as expected.

718886

When the SIP session helper is enabled, SIP traffic is offloaded to NP7 processors.

719794

Resolved an issue that could prevent the IP Pool option from appearing in a hyperscale firewall policy.

720203

Resolved an issue that caused session helper sessions to be offloaded to NP7 processors after changing the IP pool in a hyperscale firewall policy.

720592

Resolved an issue that caused hardware sessions to expire on the secondary FortiGate in an FGCP HA cluster.

720595 Hyperscale firewall hardware logging now supports more than ten hardware logging servers.

721231

Resolved an issue that caused IPsec VPN sessions between VDOMs to timeout while they are processing traffic.

721246 721282 Resolved an issue that prevented adding custom service groups to hyperscale firewall policies.
721328 Fixes to DSE hit logic.

721349

Resolved an issue that could cause a WiFi client to disconnect after connecting to a WiFi interface with a tunnel SSID.

721442

Resolved an issue that prevented the diagnose npu np7 gtp-stats-all and diagnose npu np7 gtp-stats <np#> commands from displaying output on the primary FortiGate in an FGCP cluster when GTP enhanced mode is enabled.

722128 722547

Improved fragmented packet handling to prevent dropped packets when fragment SKB size is relatively small.

722375 Resolved an NP7 issue with GTP enhanced mode that could block GTP-U traffic.

723551

Resolved an issue that could prevent TFTP ALG sessions from being offloaded to NP7 processors.

725268 714711

IPsec traffic can now be offloaded when being sent over an EMAC VLAN interface.

725343

Messages similar to NPD vd=x get tmo id=xxxx fail! no longer appear after restoring the configuration.

725581 The config log npu-server command no longer generates ICMP log messages if ICMP logging is not enabled.

725978

Sync session count information has been added to the output of the get system ha status command.

726262

The GUI will no longer display an error message when you edit the first port number in a port number range in a CGN resource allocation IP pool.

726265

Resolved synchronization issues that caused various HA-related performance reductions or unexpected behavior.

726531

The log rate is no longer displayed as a negative value after changing hardware logging to host logging mode.

726542

Resolved an issue that was keeping software sessions in the session table after traffic has stopped.

727391

Resolved an issue that caused PBA leaks with the FortiGate is configured with a large number of VLANs (for example, 1000 VLANs).

For optimal performance, the following option should be set to disable if your configuration includes 256 or more VLANs:

config system npu

set vlan-lookup-cache {disable | enable}

end

Enabling or disabling vlan-lookup-cache requires a system restart. So you should only change this setting during a maintenance window. This option is disabled by default.

727907

Resolved an issue that caused both FortiGates in an FGSP cluster to create duplicate log messages for the same hardware session. The resolution prevents sessions on the secondary FortiGate from creating log messages. This means that if a failover occurs, the session will continue on the secondary FortiGate but when the sessions ends, it will not create a session end log message.

728453

Resolved an issue that could cause the npd process to crash when editing CGN IP pools. This issue can also cause packets to be stuck. You can use the diagnose npu np7 setreg command to enable a watch dog and adjust the threshold for releasing stuck packets.

730155 730527

Resolved an issue that caused the reverse deny policy to block all traffic and also helped improve performance and reduce processing errors.

730160

Resolved an issue that caused inaccurate session counts to be displayed on the GUI for individual VDOMs.

730526 Resolved an issue with how NP7 processors handle internal IPsec processing that could cause LACP/BFD/BGP flapping.

732152

Changes to session-ttl are now successfully applied to all sessions.

734342 Resolved an NP7-related issue caused by some traffic shaping configurations that could cause FortiGate interfaces to become unresponsive because ARP replies will no longer be sent by FortiGate interfaces. Added a new command diagnose npu np7 session-offload-stats allthat will display statistics that include NP7 session offloading errors.

735269

Resolve an issue with how FortiOS handles hyperscale firewall policy changes that could cause traffic to continue to be accepted by a hyperscale firewall policy when the Action is changed to Deny All while the FortiGate is processing traffic.

735807

Resolved an issue that caused synchronization errors after creating 249 VDOMs.

737535 Resolved an issue that prevented collecting and displaying the session count for NAT64 and NAT46 sessions processed by software.

737112

Resolved and issue that prevented deleting multiple VDOMs when CPU or host hardware logging is enabled.

Common vulnerabilities and exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

677844

Hyperscale firewall for FortiOS 6.2.9 SSL VPN portal is no longer vulnerable to an XSS.

Resolved issues

Resolved issues

The following issues have been fixed in Hyperscale firewall for FortiOS 6.2.9 Build 7197. For inquires about a particular bug, please contact Customer Service & Support. The Resolved issues described in the FortiOS 6.2.9 release notes also apply to Hyperscale firewall for FortiOS 6.2.9 Build 7197.

Bug ID

Description

662514

Improved handling of NAT46 traffic to prevent problems caused by the frame size increase resulting from converting an IPv4 packet to an IPv6 packet.

695803

Resolved an issue that prevented being able to change the order of DoS firewall policies from the GUI or CLI.

707298

Resolved an issue that would periodically cause the snmpd process to use excessive amounts of CPU time.

709046

Resolved an issue that could cause inaccurate statistics reporting when the FortiGate is processing a large number of sessions.

711135 722922

Resolved synchronization issues that caused various HA-related performance reductions or unexpected behavior.

712023 713415

Resolved an issue that prevented IPS from scanning traffic in a CAPWAP tunnel when DTLS and nTurbo is enabled.

712221

Resolved an issue that caused SSH management sessions to disconnect after entering the command diagnose traffictest set_pair aggregateInt.

713432 727173

Adjusted the CPU/Memory Performance Test threshold so that the test can find meaningful results, which are then displayed by the diagnose hardware test info command.

714198

Resolved an issue with how IPS re-directs NP7 offloaded sessions that can cause excess latency in transparent mode VDOMs. This issue could also block network backup traffic using port 1867.

714800

Resolved an issue that caused NPD process timeouts on the secondary FortiGate in an FGCP cluster after editing a hyperscale firewall policy and changing the CGN IP pool used in the policy.

714915

Changing the configuration of a hardware log server group assigned to a hyperscale firewall policy that is processing traffic no longer causes sessions accepted by the firewall policy to be dropped.

715090

Resolved an issue that prevented the FortiGate-2600F and 2601F from displaying the default fortilink interface on the GUI or CLI.

716094

Resolved an issue that could disrupt traffic when enabling per-IP traffic shaping and max-concurrent-session for a firewall policy with NP7 offloading enabled.

716169

SPF interfaces with speed set to 1000full no longer remain down after the system restarts.

716766 717564

Resolved synchronization issues that caused various HA-related performance reductions or unexpected behavior.

718713

Configuring an interface to drop fragmented packets (drop-fragment set to enable) now works as expected.

718886

When the SIP session helper is enabled, SIP traffic is offloaded to NP7 processors.

719794

Resolved an issue that could prevent the IP Pool option from appearing in a hyperscale firewall policy.

720203

Resolved an issue that caused session helper sessions to be offloaded to NP7 processors after changing the IP pool in a hyperscale firewall policy.

720592

Resolved an issue that caused hardware sessions to expire on the secondary FortiGate in an FGCP HA cluster.

720595 Hyperscale firewall hardware logging now supports more than ten hardware logging servers.

721231

Resolved an issue that caused IPsec VPN sessions between VDOMs to timeout while they are processing traffic.

721246 721282 Resolved an issue that prevented adding custom service groups to hyperscale firewall policies.
721328 Fixes to DSE hit logic.

721349

Resolved an issue that could cause a WiFi client to disconnect after connecting to a WiFi interface with a tunnel SSID.

721442

Resolved an issue that prevented the diagnose npu np7 gtp-stats-all and diagnose npu np7 gtp-stats <np#> commands from displaying output on the primary FortiGate in an FGCP cluster when GTP enhanced mode is enabled.

722128 722547

Improved fragmented packet handling to prevent dropped packets when fragment SKB size is relatively small.

722375 Resolved an NP7 issue with GTP enhanced mode that could block GTP-U traffic.

723551

Resolved an issue that could prevent TFTP ALG sessions from being offloaded to NP7 processors.

725268 714711

IPsec traffic can now be offloaded when being sent over an EMAC VLAN interface.

725343

Messages similar to NPD vd=x get tmo id=xxxx fail! no longer appear after restoring the configuration.

725581 The config log npu-server command no longer generates ICMP log messages if ICMP logging is not enabled.

725978

Sync session count information has been added to the output of the get system ha status command.

726262

The GUI will no longer display an error message when you edit the first port number in a port number range in a CGN resource allocation IP pool.

726265

Resolved synchronization issues that caused various HA-related performance reductions or unexpected behavior.

726531

The log rate is no longer displayed as a negative value after changing hardware logging to host logging mode.

726542

Resolved an issue that was keeping software sessions in the session table after traffic has stopped.

727391

Resolved an issue that caused PBA leaks with the FortiGate is configured with a large number of VLANs (for example, 1000 VLANs).

For optimal performance, the following option should be set to disable if your configuration includes 256 or more VLANs:

config system npu

set vlan-lookup-cache {disable | enable}

end

Enabling or disabling vlan-lookup-cache requires a system restart. So you should only change this setting during a maintenance window. This option is disabled by default.

727907

Resolved an issue that caused both FortiGates in an FGSP cluster to create duplicate log messages for the same hardware session. The resolution prevents sessions on the secondary FortiGate from creating log messages. This means that if a failover occurs, the session will continue on the secondary FortiGate but when the sessions ends, it will not create a session end log message.

728453

Resolved an issue that could cause the npd process to crash when editing CGN IP pools. This issue can also cause packets to be stuck. You can use the diagnose npu np7 setreg command to enable a watch dog and adjust the threshold for releasing stuck packets.

730155 730527

Resolved an issue that caused the reverse deny policy to block all traffic and also helped improve performance and reduce processing errors.

730160

Resolved an issue that caused inaccurate session counts to be displayed on the GUI for individual VDOMs.

730526 Resolved an issue with how NP7 processors handle internal IPsec processing that could cause LACP/BFD/BGP flapping.

732152

Changes to session-ttl are now successfully applied to all sessions.

734342 Resolved an NP7-related issue caused by some traffic shaping configurations that could cause FortiGate interfaces to become unresponsive because ARP replies will no longer be sent by FortiGate interfaces. Added a new command diagnose npu np7 session-offload-stats allthat will display statistics that include NP7 session offloading errors.

735269

Resolve an issue with how FortiOS handles hyperscale firewall policy changes that could cause traffic to continue to be accepted by a hyperscale firewall policy when the Action is changed to Deny All while the FortiGate is processing traffic.

735807

Resolved an issue that caused synchronization errors after creating 249 VDOMs.

737535 Resolved an issue that prevented collecting and displaying the session count for NAT64 and NAT46 sessions processed by software.

737112

Resolved and issue that prevented deleting multiple VDOMs when CPU or host hardware logging is enabled.

Common vulnerabilities and exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

677844

Hyperscale firewall for FortiOS 6.2.9 SSL VPN portal is no longer vulnerable to an XSS.