Fortinet black logo

Known issues

Known issues

The following issues have been identified in FortiGate-6000 and FortiGate-7000 FortiOS 7.0.14 Build 0226. For inquires about a particular bug, please contact Customer Service & Support. The Known issues described in the FortiOS 7.0.14 release notes also apply to FortiGate-6000 and 7000 FortiOS 7.0.14 Build 0226.

Bug ID

Description

700630

Some GUI pages may randomly take longer to load than expected or not load at all.

745799

The FortiView sessions pane fails to load.

744071

FPC and FPM Session Rate dashboard widgets display correct session rates, but the accompanying graphs may be incorrect.

782978 When setting up a FortiGate-6000 or 7000 FGCP HA cluster, one of the FortiGates in the cluster may be running an older firmware version. During cluster formation, the newer firmware version is installed on FortiGate running the older firmware version. After the firmware is downloaded and before the FortiGate restarts, the console may display incorrect error messages. Even when these error messages appear the FortiGate should start up normally, running the newer firmware version, and should be able to join the cluster.
785815 An FPM may display an incorrect checksum message on the console while restarting. The FPM will continue to operate normally after fully starting.

803082

Policy statistics data that appear on the GUI firewall policy pages and in FortiView may be incorrect.

806304

The Packet capture GUI page needs to be manually refreshed for the cloned packet capture to be seen. The same issue is not observed with the create packet capture action.

807425

After successfully resetting a managed FortiSwitich from the FortiGate-6000 or 7000 GUI, a Failed to factory reset FortiSwitich message may appear.

813569 Operating a FortiGate-6000 or 7000 as an SSL VPN client is not supported.

840762

In some cases, the GUI will not display the Configuration Sync Monitor GUI page. You can work around this issue by stopping the node.js process. Once the node.js process is stopped, you will loose access to the GUI for a few seconds. Once node.js restarts you can access the GUI and the Configuration Sync Monitor GUI page should be available.

You can use the following command to find the node.js process number:

diagnose sys process pidof node

The output of this command will be the node.js process number. Enter the following command to stop the node.js process.

diagnose sys kill 9 <node.js-process-number>

860948 915952

Session and Session Rate dashboard widgets may display incorrect information. This can happen more commonly when the system is processing high traffic volumes.

869454

In some IPsec configurations that include dynamic routing , the IP address of an IPsec interface can be set to 0.0.0.0. This happens if the IP address for the interface is received before the interface is up, so the interface address is not configured.

You can work around this problem by flushing the tunnel using the IPsec interface that is not set up correctly.

911668

Some processes on the secondary FortiGate 6000 or 7000 in an FGCP cluster may incorrectly generate arp requests. Since the secondary FortiGate 6000 or 7000 data interfaces are blocked, these arp requests do not reach any networks, but they can be seen from the CLI using diagnose commands.

916717 700630

Some FortiGate 6000 or 7000 GUI pages may randomly take longer that expected to load.

918795

After upgrading from FortiOS 7.0.10 to 7.0.12, the FPCs or the secondary FIM and the FPMs will appear to be running un-certified firmware. This also applies to the FPCs or the secondary FIM and the FPMs in the secondary chassis in an HA configuration.

This problem occurs because of the way FortiOS 7.0.10 synchronized signatures from the management board to the FPCs or from the primary FIM to the secondary FIM and the FPMs during the firmware upgrade process.

FortiOS 7.0.12 fixes signature handling, so you can resolve this problem by installing FortiOS 7.0.12 firmware a second time, using a normal firmware upgrade procedure.

924059

Dashboard widgets in the Root VDOM does not show CPU/Memory/Session/Session Rate stats.

You can work around this issue by adding dashboard widgets for specific FPCs or FPMs.

919606

During a FortiGate-7000F firmware upgrade FPM CLI consoles may display messages similar to the following:

[ha_shm_mutex_enter:2781] fgtAttachShm() failed.

[update_ha_mac:3497] ha_shm_mutex_enter() failed.

These messages are caused by timing issues as the FPMs are starting up. Once the FPMs have started they should operate normally.

931711

From the FortiGate-6000 management board GUI, the Security Rating page may incorrectly flag firewall policies as Unused Policies, even though these policies have been processing traffic.This is happening because the management board Security Rating system is not receiving policy usage information from the FPCs. If you log into an FPC GUI, you can verify that the Security Rating page has not flagged the same policies as as unused policies.

962951

Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.13 to 7.2.5 or 7.2.6.

Upgrading the firmware of a FortiGate-6000 or 7000 FGCP HA cluster from 7.0.13 to 7.2.5 or 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for a few minutes.

Before upgrading the firmware, disable uninterruptible-upgrade. Then perform a normal firmware upgrade. During the upgrade process the FortiGates in the cluster will not allow traffic until all components (management board and FPCs or FIMs and FPMs) are upgraded and both FortiGates have restarted. This process can take a few minutes.

951193

SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you can't create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x.

If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis syncs its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version.

You could also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x.

For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement.

958276

Due to known GUI performance issues, the HA dashboard widget may not always display some information and the information that appears on the widget may change randomly.

987672

Fragmented packets with DEI == 1 are blocked

988204

Some firmware upgrades fail because the BIOS security level is set to 1. You can fix the problem by setting the BIOS security level to 0.

1011674

Upgrading a FortiGate 6000 or 7000 from FortiOS 7.0.14 to 7.2.8 is not supported because of an issue with the FortiOS 7.0.14 firmware. The same issue was present in FortiGate 6000 and 7000 FortiOS 7.2.8 build1639. This issue has been resolved with FortiGate-6000 and 7000 for FortiOS 7.2.8 build 8735, which is now available for download from the FortiOS 7.2.8 firmware folder on the Fortinet support site.

FortiOS 7.0.14 firmware has not been fixed. Instead, Fortinet recommends not upgrading to FortiGate 6000 or 7000 for FortiOS 7.0.14. Either keep running FortiOS 7.0.13 or upgrade to 7.2.8.

If you are already running FortiGate 6000 or 7000 for FortiOS 7.0.14, before upgrading to FortiOS 7.2.8 you should downgrade to FortiOS 7.0.13 and then upgrade to 7.2.8. Upgrading from FortiOS 7.0.13 to 7.2.8 is supported.

This issue is caused by how FortiGate 6000 and 7000 FortiOS 7.0.14 interacts with the FortiGate security level. You can work around this issue by changing your FortiGate 6000 and 7000 security level. However, changing the security level is not recommended.

Contact Fortinet Support for assistance.

Known issues

The following issues have been identified in FortiGate-6000 and FortiGate-7000 FortiOS 7.0.14 Build 0226. For inquires about a particular bug, please contact Customer Service & Support. The Known issues described in the FortiOS 7.0.14 release notes also apply to FortiGate-6000 and 7000 FortiOS 7.0.14 Build 0226.

Bug ID

Description

700630

Some GUI pages may randomly take longer to load than expected or not load at all.

745799

The FortiView sessions pane fails to load.

744071

FPC and FPM Session Rate dashboard widgets display correct session rates, but the accompanying graphs may be incorrect.

782978 When setting up a FortiGate-6000 or 7000 FGCP HA cluster, one of the FortiGates in the cluster may be running an older firmware version. During cluster formation, the newer firmware version is installed on FortiGate running the older firmware version. After the firmware is downloaded and before the FortiGate restarts, the console may display incorrect error messages. Even when these error messages appear the FortiGate should start up normally, running the newer firmware version, and should be able to join the cluster.
785815 An FPM may display an incorrect checksum message on the console while restarting. The FPM will continue to operate normally after fully starting.

803082

Policy statistics data that appear on the GUI firewall policy pages and in FortiView may be incorrect.

806304

The Packet capture GUI page needs to be manually refreshed for the cloned packet capture to be seen. The same issue is not observed with the create packet capture action.

807425

After successfully resetting a managed FortiSwitich from the FortiGate-6000 or 7000 GUI, a Failed to factory reset FortiSwitich message may appear.

813569 Operating a FortiGate-6000 or 7000 as an SSL VPN client is not supported.

840762

In some cases, the GUI will not display the Configuration Sync Monitor GUI page. You can work around this issue by stopping the node.js process. Once the node.js process is stopped, you will loose access to the GUI for a few seconds. Once node.js restarts you can access the GUI and the Configuration Sync Monitor GUI page should be available.

You can use the following command to find the node.js process number:

diagnose sys process pidof node

The output of this command will be the node.js process number. Enter the following command to stop the node.js process.

diagnose sys kill 9 <node.js-process-number>

860948 915952

Session and Session Rate dashboard widgets may display incorrect information. This can happen more commonly when the system is processing high traffic volumes.

869454

In some IPsec configurations that include dynamic routing , the IP address of an IPsec interface can be set to 0.0.0.0. This happens if the IP address for the interface is received before the interface is up, so the interface address is not configured.

You can work around this problem by flushing the tunnel using the IPsec interface that is not set up correctly.

911668

Some processes on the secondary FortiGate 6000 or 7000 in an FGCP cluster may incorrectly generate arp requests. Since the secondary FortiGate 6000 or 7000 data interfaces are blocked, these arp requests do not reach any networks, but they can be seen from the CLI using diagnose commands.

916717 700630

Some FortiGate 6000 or 7000 GUI pages may randomly take longer that expected to load.

918795

After upgrading from FortiOS 7.0.10 to 7.0.12, the FPCs or the secondary FIM and the FPMs will appear to be running un-certified firmware. This also applies to the FPCs or the secondary FIM and the FPMs in the secondary chassis in an HA configuration.

This problem occurs because of the way FortiOS 7.0.10 synchronized signatures from the management board to the FPCs or from the primary FIM to the secondary FIM and the FPMs during the firmware upgrade process.

FortiOS 7.0.12 fixes signature handling, so you can resolve this problem by installing FortiOS 7.0.12 firmware a second time, using a normal firmware upgrade procedure.

924059

Dashboard widgets in the Root VDOM does not show CPU/Memory/Session/Session Rate stats.

You can work around this issue by adding dashboard widgets for specific FPCs or FPMs.

919606

During a FortiGate-7000F firmware upgrade FPM CLI consoles may display messages similar to the following:

[ha_shm_mutex_enter:2781] fgtAttachShm() failed.

[update_ha_mac:3497] ha_shm_mutex_enter() failed.

These messages are caused by timing issues as the FPMs are starting up. Once the FPMs have started they should operate normally.

931711

From the FortiGate-6000 management board GUI, the Security Rating page may incorrectly flag firewall policies as Unused Policies, even though these policies have been processing traffic.This is happening because the management board Security Rating system is not receiving policy usage information from the FPCs. If you log into an FPC GUI, you can verify that the Security Rating page has not flagged the same policies as as unused policies.

962951

Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.13 to 7.2.5 or 7.2.6.

Upgrading the firmware of a FortiGate-6000 or 7000 FGCP HA cluster from 7.0.13 to 7.2.5 or 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for a few minutes.

Before upgrading the firmware, disable uninterruptible-upgrade. Then perform a normal firmware upgrade. During the upgrade process the FortiGates in the cluster will not allow traffic until all components (management board and FPCs or FIMs and FPMs) are upgraded and both FortiGates have restarted. This process can take a few minutes.

951193

SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you can't create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x.

If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis syncs its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version.

You could also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x.

For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement.

958276

Due to known GUI performance issues, the HA dashboard widget may not always display some information and the information that appears on the widget may change randomly.

987672

Fragmented packets with DEI == 1 are blocked

988204

Some firmware upgrades fail because the BIOS security level is set to 1. You can fix the problem by setting the BIOS security level to 0.

1011674

Upgrading a FortiGate 6000 or 7000 from FortiOS 7.0.14 to 7.2.8 is not supported because of an issue with the FortiOS 7.0.14 firmware. The same issue was present in FortiGate 6000 and 7000 FortiOS 7.2.8 build1639. This issue has been resolved with FortiGate-6000 and 7000 for FortiOS 7.2.8 build 8735, which is now available for download from the FortiOS 7.2.8 firmware folder on the Fortinet support site.

FortiOS 7.0.14 firmware has not been fixed. Instead, Fortinet recommends not upgrading to FortiGate 6000 or 7000 for FortiOS 7.0.14. Either keep running FortiOS 7.0.13 or upgrade to 7.2.8.

If you are already running FortiGate 6000 or 7000 for FortiOS 7.0.14, before upgrading to FortiOS 7.2.8 you should downgrade to FortiOS 7.0.13 and then upgrade to 7.2.8. Upgrading from FortiOS 7.0.13 to 7.2.8 is supported.

This issue is caused by how FortiGate 6000 and 7000 FortiOS 7.0.14 interacts with the FortiGate security level. You can work around this issue by changing your FortiGate 6000 and 7000 security level. However, changing the security level is not recommended.

Contact Fortinet Support for assistance.