New features or enhancements
More detailed information is available in the New Features Guide.
Feature ID |
Description |
||
---|---|---|---|
913213 |
When authenticating users with a RADIUS server, FortiOS can now dynamically assign a different NAS-IP-Address attribute to the managed switches. For more control, this feature also allows you to manually override the dynamic assignment and set the NAS-IP-Address attribute for individual switches as per your requirements. |
||
936747 |
On FortiGates with multiple NP7 processors with hyperscale enabled, you can use the following command to optimize NP7 network session setup (NSS) engine performance. config system npu set nss-threads-option {4T-EIF | 4T-NOEIF | 2T} end
|
||
955835 | Previously, when auto-upgrade was disabled, users would receive a warning advising them to execute exec federated-upgrade cancel
in order to remove any scheduled upgrades. However, with the new update, the system is now capable of autonomously canceling any pending upgrades, eliminating the need for manual user action. |
||
973573 | You can now specify a tagged VLAN for users to be assigned to when the authentication server is unavailable. Previously, you could only specify an untagged VLAN. This feature is available with 802.1x MAC-based authentication. It is compatible with both Extensible Authentication Protocol (EAP) and MAC authentication bypass (MAB). | ||
1006448 | Enhance SSL VPN security by restricting and validating HTTP messages that are used only by web mode and tunnel mode. | ||
1007937 | Support the Zstandard (zstd) compression algorithm for web content. This enhancement enables FortiOS to decode, scan, and forward zstd-encoded web content in a proxy-based policy. The content can then be passed or blocked based on the UTM profile settings. This ensures a seamless and secure browsing experience. | ||
1012626 |
In this enhancement, a hash of all executable binary files and shared libraries are taken during image build time. The file containing these hashes, called the executable hash, is also hashed and as a result signed. The signature for this hash is verified during bootup to ensure integrity of the file. After validation, the hashes of all executable and share libraries can be loaded into memory for real-time protection. |
||
1013511 | This enhancement requires the kernel to verify the signed hashes of important file-system and object files during boot-up. This prevents unauthorized changes to file-systems to be mounted, and other unauthorized objects to be loaded into user space on boot-up. If the signed hash verification fails, the system will halt. |