Fortinet white logo
Fortinet white logo

Known issues

Known issues

Known issues are organized into the following categories:

To inquire about a particular bug or report a bug, please contact Customer Service & Support.

New known issues

There are currently no new issues that have been identified in version 7.2.13.

Existing known issues

The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.2.13.

Anti Virus

Bug ID

Description

937375

Unable to delete malware threat feeds using the CLI.

Explicit Proxy

Bug ID

Description

865828

Unexpected behavior occurs when configuring internet services with custom or ISDB entries, leading to failed negate options and issues with internet-service6 functionality.

890776

The GUI-explicit-proxy setting on the System > Feature Visibility page is not retained after a FortiGate reboot or upgrade.

894557

In some cases, the explicit proxy policy list can take a long time to load due to a delay in retrieving the proxy statistics. This issue does not impact explicit proxy functionality.

Workaround: restart the WAD process, or temporarily disable the WAD debugging process (when FortiGate reboots, this process will need to be disabled again).

diagnose wad toggle

(use direct connect diagnose)

1059899

When setting sec-default-action to accept on an initial explicit web proxy configuration after a factory reset, incoming traffic does not match the proxy policy and allows all traffic to pass.

Workaround: set sec-default-action to deny first in the CLI and then change the setting to accept.

Firewall

Bug ID

Description

1212608

FTP does not work in passive mode via the helper session.

Workaround:

  1. Configure the FTP_No_ALG custom service by disabling the helper.

  2. Create a policy that associates the FTP_No_ALG and adds the high ports "tcp-1024-65535".

FortiGate 6000 and 7000 platforms

Bug ID

Description

790464

After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond.

951135

Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.12 to 7.2.6.

Upgrading the firmware of a FortiGate 6000 or 7000 FGCP HA cluster from 7.0.12 to 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for up to 30 minutes.

Before upgrading the firmware, disable uninterruptible-upgrade, then perform a normal firmware upgrade. During the upgrade process the FortiGates in the cluster will not allow traffic until all components (management board and FPCs or FIMs and FPMs) are upgraded and both FortiGates have restarted. This process can take up to 30 minutes.

951193

SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you cannot create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x.

If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis synchronizes its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version.

You can also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x.

For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement.

954881

Unintended behavior occurs when FortiGate models perform a warm reboot without properly applying virtual domain configurations.

994241

On FortiGate 7000F using FGSP and FGCP, when TCP traffic takes an asymmetric path, the TCP ACK and data packets might be dropped in NP7.

1006759

After an HA failover, there is no IPsec route in the kernel.

Workaround: Bring down and bring up the tunnel.

1056894

On the FortiGate 6000 platform, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1062080

SNMP query returns an error when there is a large number of BGP routes.

1070365

FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the session-sync-dev option, for example:

config system ha
    set session-sync-dev 1-M1 1-M2
end

The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the session-sync-dev command from mgmt-vdom to vsys_ha and the interfaces stop working as session sync interfaces.

You can work around the problem by manually changing the vdom of the management interfaces added to session-sync-dev to mgmt-vdom and then retrieving the FortiGate configuration from FortiManager.

config system interface
    edit 1-M1
        set vdom mgmt-vdom
    next
    edit 1-M2
        set vdom mgmt-vdom
    next
end

1093412

For an FGSP configuration on the FortiGate 6000 and 7000 platforms, the encryption option of the config system standalone-cluster command does not encrypt session synchronization traffic. Enabling this option has no effect.

1096156

GUI unreachable due to certificates and private keys mismatch in a HA setup.

1149342

BGP flapping occurs when concurrent IP address management causes unexpected source IP usage on outbound connections during FortiGate VDOM migrations.

1183735

Graceful upgrades lead to unintended primary claiming by FortiGate units during HA resynchronization.

1185528

Subscription license on the secondary chassis is missing after the graceful upgrade from 7.2.10 to 7.2.12.

Workaround: run execute update-now again.

FortiView

Bug ID

Description

1123502

FortiView Threats: drilling down to malicious website entry returns Failed to retrieve FortiView data from disk.

GUI

Bug ID

Description

853352

On the View/Edit Entries slide-out pane (Policy & Objects > Internet Service Database dialog), users cannot scroll down to the end if there are over 100000 entries.

974988

FortiGate GUI should not display a license expired notification due to an expired FortiManager Cloud license if it still has a valid account level FortiManager Cloud license (function is not affected).

989512

When the number of users in the Firewall User monitor exceeds 2000, the search bar, column filters, and graphs are no longer displayed due to results being lazily loaded.

993890

The Node.JS daemon restarts with a kill ESRCH error on FortiGate after an upgrade.

999972

Edits that are made to IP Exemptions in IPS Signatures and Filters more than once on the Security Profiles > Intrusion Prevention page are not saved.

1055197

On FortiGate G series models with dual WAN links, the Interface Bandwidth widget may show an incorrect incoming and outgoing bandwidth count where the actual traffic does not match the display numbers.

1143734

Network > SD-WAN > SD-WAN Rules: When editing a rule, inline edit from the omniselect is not available for Application Group entries.

Workaround: edit the application from Security Profiles > Application Signatures > Group or using the command line.

HA

Bug ID

Description

781171

When performing HA upgrade in the GUI, if the secondary unit takes several minutes to bootup, the GUI may show a misleading error message Image upgrade failed due to premature timeout.

This is just a GUI display issue and the HA upgrade can still complete without issue.

970316

When adding a new vcluster, the link-failure value of the newly added vcluster is not updated, causing the wrong primary unit to be selected.

988944

The Fabric Management page displays inconsistent information when accessed through secondary HA units on some FortiGate models.

1072440

Special branch supported models of FortiGate in an HA cluster with an empty HA password, upgrading from a special build GA version (version 7.0.x) to version 7.2.9 and version 7.2.10 GA can cause one of the members to not upgrade.

Impacted models: Please see a full list of Special branch supported models for FortiOS version 7.0.15.

Workaround: configure a valid HA password for the cluster before the upgrade, or manually upgrade the member that was impacted.

config system ha
    set password <new-password>
end
Note

Setting the password causes an HA cluster re-election to occur.

Hyperscale

Bug ID

Description

802182

After successfully changing the VLAN ID of an interface from the CLI, an error message similar to cmdb_txn_cache_data(query=log.npu-server,leve=1) failed may appear.

817562

LPMD fails to correctly handle different VRFs, treating all as vrf 0, causing improper route management and affecting network traffic isolation.

824071

IPv6 traffic fails to load balance across multiple virtual domains when using Equal-cost Multipath (ECMP) in NAT mode on FortiGate devices.

843197

The npu-session list fails to display policy-route information when traffic is routed through a policy route on FortiGate models using NPU acceleration.

853258

Traffic drops occur after Failover in HA A-P setups using hardware-only sessions.

872146

The "diagnose sys npu-session list" command displays incorrect policy IDs when traffic uses intra-zone policies.

920228

NAT46 NPU sessions are lost and traffic drops when a HA failover occurs.

1170648

diagnose firewall ippool list pba command is executed in a hyperscale device may result in high CPU. No workaround available.

1178585

Traffic outage occurs when making ip-pool group changes on hyperscale VDOMs.

1223321

IP pools got stuck when session-ttl changes are made

IPsec VPN

Bug ID

Description

944600

CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink.

1128662

BGP peering fails to establish when a race condition occurs between FortiGate OS and NPU driver during IPsec SA updates for dynamic hub-to-static spoke VPNs.

REST API

Bug ID

Description

1004136

Unable to fetch more than 1000 logs using an REST API GET request.

Routing

Bug ID

Description

896090

SD-WAN Performance SLA health checks fail when FortiGuard is configured as the server due to lack of HTTP support on FortiGuard servers.

903444

The diagnose ip rtcache list command is no longer supported in the FortiOS 4.19 kernel.

924693

On the Network > SD-WAN > SD-WAN Rules page, member interfaces that are down are incorrectly shown as up. The tooltip on the interface shows the correct status.

1025201

FortiGate encounters a duplication issue in a hub and spoke configuration with set packet-duplication force enabled on a spoke and set packet-de-duplication enabled on the hub.

Security Fabric

Bug ID

Description

903922

Security Fabric physical and logical topology is slow to load when there are a lot of downstream devices, including FortiGates, FortiSwitches, FortiAPs, and endpoint device traffic. This is a GUI only display issue and does not impact operations of downstream devices.

1011833

FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages.

Workaround: disconnect the other concurrent administrator sessions to avoid overloading node process.

1120652

Fabric topology with two devices on different VDOMs but behind the same router shows wrong VDOM data on tooltip.

Workaround: Disable device-identification on that interface.

SSL VPN

Bug ID

Description

795381

FortiClient Windows cannot be launched with SSL VPN web portal.

941676

Incorrect character entered when using Shift+2 on Japanese keyboard during RDP session in SSL-VPN web mode.

Switch Controller

Bug ID

Description

947351

The FortiSwitch topology fails to load correctly and triggers Java errors in HTTPS logs when switches are connected via SFPs.

961142

An interface in FortiLink is flapping with MCLAG with DAC on an OPSFPP-T-05-PAB transceiver.

System

Bug ID

Description

782710

VLAN-over-VXLAN traffic was not being offloaded to NP7, causing performance issues due to increased CPU load.

882862

On FortiGate 400F, 600F, 900G, 3200F, and 3700F models, LAG interface members are not shutting down when the remote end interface (one member in the LAG) is admin down.

901621

On the NP7 platform, setting the interface configuration using set inbandwidth <x> or set outbandwidth <x> commands stops traffic flow.

Workaround: Change the NP7 ""default-qos-type"" setting from shaping to policing. This requires a restart of the device for the configuration to take effect.

config system npu
   set default-qos-type policing
end

921604

On the FortiGate 601F, the ports (x7) have no cables attached but the link LEDs are green.

1045866

The node daemon causes a CPU usage and memory usage issue when many interfaces are being edited or created at once.

1078119

Traffic is intermittently interrupted on virtual-vlan-switch on Soc5 based platforms when a multicast or broadcast packet is received.

1078541

The FortiFirewall 2600F model may become stuck after a fresh image burn. Upgrading from a previous version stills works.

Workaround: power cycle the unit.

1114594

On the FG-200G, SDNS is not able to connect to FortiGuard servers.

Workaround: use DNS instead of SDNS.

config system dns
    set protocol cleartext
end

1121548

Enabling device-identification also gets endpoint information, even though intermediate router exists on FG and endpoints.

Workaround: Disable device-identification on that interface.

Upgrade

Bug ID

Description

1055486

On the Firmware and Registration page, when performing a Fabric Upgrade using the GUI for the whole Fabric topology that includes managed FortiAPs and FortiSwitches, the root FortiGate may use an incorrect recommended image for FortiAP and FortiSwitch due to a parsing issue.

Workaround: initiate the Fabric Upgrade using the CLI.

User & Authentication

Bug ID

Description

1043189

Low-end FortiGate models with 2GB memory may enter conserve mode when processing large user store data with over 5000 user records and each record has a large number of IoT vulnerability data.

For example, the Users and Devices page or FortiNAC request can trigger the following API call that causes the httpsd process encounter a CPU usage issue and memory usage issue.

GET request /api/v2/monitor/user/device/query

VM

Bug ID

Description

899984

If FGTVM was deployed in UEFI boot mode, do not downgrade to any GA version earlier than 7.2.4.

1094274

FortiOS becomes unresponsive when sending IPv6 traffic over MLX5 network adapters due to incorrect WQE handling.

1119140

Incorrect deployment of DLP configurations occurs when FortiGate VMs are deployed on hypervisors with Intel Skylake processors.

Web Filter

Bug ID

Description

885222

HTTP sessions are logged as HTTPS in web filter logs when using an HTTP VIP server, causing incorrect protocol identification.

WiFi Controller

Bug ID

Description

869106

The layer 3 roaming feature may not work when the wireless controller is running multiple cw_acd processes (when the value of acd-process-count is not zero).

869978

In HA cluster of FGT-200F units with 'capwap-offload' enabled, traffic from tunnel SSID cannot pass after HA failover is triggered.

873273

The automatically connect option fails to function when the local radio connection is lost on some FortiGate models.

941691

Managed FortiSwitch detects multiple MACs using the same IP address.

ZTNA

Bug ID

Description

819987

Mapped drives become inaccessible after laptop reboots when using FortiGate ZTNA access proxy with FQDN destinations.

Known issues

Known issues

Known issues are organized into the following categories:

To inquire about a particular bug or report a bug, please contact Customer Service & Support.

New known issues

There are currently no new issues that have been identified in version 7.2.13.

Existing known issues

The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.2.13.

Anti Virus

Bug ID

Description

937375

Unable to delete malware threat feeds using the CLI.

Explicit Proxy

Bug ID

Description

865828

Unexpected behavior occurs when configuring internet services with custom or ISDB entries, leading to failed negate options and issues with internet-service6 functionality.

890776

The GUI-explicit-proxy setting on the System > Feature Visibility page is not retained after a FortiGate reboot or upgrade.

894557

In some cases, the explicit proxy policy list can take a long time to load due to a delay in retrieving the proxy statistics. This issue does not impact explicit proxy functionality.

Workaround: restart the WAD process, or temporarily disable the WAD debugging process (when FortiGate reboots, this process will need to be disabled again).

diagnose wad toggle

(use direct connect diagnose)

1059899

When setting sec-default-action to accept on an initial explicit web proxy configuration after a factory reset, incoming traffic does not match the proxy policy and allows all traffic to pass.

Workaround: set sec-default-action to deny first in the CLI and then change the setting to accept.

Firewall

Bug ID

Description

1212608

FTP does not work in passive mode via the helper session.

Workaround:

  1. Configure the FTP_No_ALG custom service by disabling the helper.

  2. Create a policy that associates the FTP_No_ALG and adds the high ports "tcp-1024-65535".

FortiGate 6000 and 7000 platforms

Bug ID

Description

790464

After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond.

951135

Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.12 to 7.2.6.

Upgrading the firmware of a FortiGate 6000 or 7000 FGCP HA cluster from 7.0.12 to 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for up to 30 minutes.

Before upgrading the firmware, disable uninterruptible-upgrade, then perform a normal firmware upgrade. During the upgrade process the FortiGates in the cluster will not allow traffic until all components (management board and FPCs or FIMs and FPMs) are upgraded and both FortiGates have restarted. This process can take up to 30 minutes.

951193

SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you cannot create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x.

If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis synchronizes its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version.

You can also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x.

For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement.

954881

Unintended behavior occurs when FortiGate models perform a warm reboot without properly applying virtual domain configurations.

994241

On FortiGate 7000F using FGSP and FGCP, when TCP traffic takes an asymmetric path, the TCP ACK and data packets might be dropped in NP7.

1006759

After an HA failover, there is no IPsec route in the kernel.

Workaround: Bring down and bring up the tunnel.

1056894

On the FortiGate 6000 platform, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1062080

SNMP query returns an error when there is a large number of BGP routes.

1070365

FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the session-sync-dev option, for example:

config system ha
    set session-sync-dev 1-M1 1-M2
end

The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the session-sync-dev command from mgmt-vdom to vsys_ha and the interfaces stop working as session sync interfaces.

You can work around the problem by manually changing the vdom of the management interfaces added to session-sync-dev to mgmt-vdom and then retrieving the FortiGate configuration from FortiManager.

config system interface
    edit 1-M1
        set vdom mgmt-vdom
    next
    edit 1-M2
        set vdom mgmt-vdom
    next
end

1093412

For an FGSP configuration on the FortiGate 6000 and 7000 platforms, the encryption option of the config system standalone-cluster command does not encrypt session synchronization traffic. Enabling this option has no effect.

1096156

GUI unreachable due to certificates and private keys mismatch in a HA setup.

1149342

BGP flapping occurs when concurrent IP address management causes unexpected source IP usage on outbound connections during FortiGate VDOM migrations.

1183735

Graceful upgrades lead to unintended primary claiming by FortiGate units during HA resynchronization.

1185528

Subscription license on the secondary chassis is missing after the graceful upgrade from 7.2.10 to 7.2.12.

Workaround: run execute update-now again.

FortiView

Bug ID

Description

1123502

FortiView Threats: drilling down to malicious website entry returns Failed to retrieve FortiView data from disk.

GUI

Bug ID

Description

853352

On the View/Edit Entries slide-out pane (Policy & Objects > Internet Service Database dialog), users cannot scroll down to the end if there are over 100000 entries.

974988

FortiGate GUI should not display a license expired notification due to an expired FortiManager Cloud license if it still has a valid account level FortiManager Cloud license (function is not affected).

989512

When the number of users in the Firewall User monitor exceeds 2000, the search bar, column filters, and graphs are no longer displayed due to results being lazily loaded.

993890

The Node.JS daemon restarts with a kill ESRCH error on FortiGate after an upgrade.

999972

Edits that are made to IP Exemptions in IPS Signatures and Filters more than once on the Security Profiles > Intrusion Prevention page are not saved.

1055197

On FortiGate G series models with dual WAN links, the Interface Bandwidth widget may show an incorrect incoming and outgoing bandwidth count where the actual traffic does not match the display numbers.

1143734

Network > SD-WAN > SD-WAN Rules: When editing a rule, inline edit from the omniselect is not available for Application Group entries.

Workaround: edit the application from Security Profiles > Application Signatures > Group or using the command line.

HA

Bug ID

Description

781171

When performing HA upgrade in the GUI, if the secondary unit takes several minutes to bootup, the GUI may show a misleading error message Image upgrade failed due to premature timeout.

This is just a GUI display issue and the HA upgrade can still complete without issue.

970316

When adding a new vcluster, the link-failure value of the newly added vcluster is not updated, causing the wrong primary unit to be selected.

988944

The Fabric Management page displays inconsistent information when accessed through secondary HA units on some FortiGate models.

1072440

Special branch supported models of FortiGate in an HA cluster with an empty HA password, upgrading from a special build GA version (version 7.0.x) to version 7.2.9 and version 7.2.10 GA can cause one of the members to not upgrade.

Impacted models: Please see a full list of Special branch supported models for FortiOS version 7.0.15.

Workaround: configure a valid HA password for the cluster before the upgrade, or manually upgrade the member that was impacted.

config system ha
    set password <new-password>
end
Note

Setting the password causes an HA cluster re-election to occur.

Hyperscale

Bug ID

Description

802182

After successfully changing the VLAN ID of an interface from the CLI, an error message similar to cmdb_txn_cache_data(query=log.npu-server,leve=1) failed may appear.

817562

LPMD fails to correctly handle different VRFs, treating all as vrf 0, causing improper route management and affecting network traffic isolation.

824071

IPv6 traffic fails to load balance across multiple virtual domains when using Equal-cost Multipath (ECMP) in NAT mode on FortiGate devices.

843197

The npu-session list fails to display policy-route information when traffic is routed through a policy route on FortiGate models using NPU acceleration.

853258

Traffic drops occur after Failover in HA A-P setups using hardware-only sessions.

872146

The "diagnose sys npu-session list" command displays incorrect policy IDs when traffic uses intra-zone policies.

920228

NAT46 NPU sessions are lost and traffic drops when a HA failover occurs.

1170648

diagnose firewall ippool list pba command is executed in a hyperscale device may result in high CPU. No workaround available.

1178585

Traffic outage occurs when making ip-pool group changes on hyperscale VDOMs.

1223321

IP pools got stuck when session-ttl changes are made

IPsec VPN

Bug ID

Description

944600

CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink.

1128662

BGP peering fails to establish when a race condition occurs between FortiGate OS and NPU driver during IPsec SA updates for dynamic hub-to-static spoke VPNs.

REST API

Bug ID

Description

1004136

Unable to fetch more than 1000 logs using an REST API GET request.

Routing

Bug ID

Description

896090

SD-WAN Performance SLA health checks fail when FortiGuard is configured as the server due to lack of HTTP support on FortiGuard servers.

903444

The diagnose ip rtcache list command is no longer supported in the FortiOS 4.19 kernel.

924693

On the Network > SD-WAN > SD-WAN Rules page, member interfaces that are down are incorrectly shown as up. The tooltip on the interface shows the correct status.

1025201

FortiGate encounters a duplication issue in a hub and spoke configuration with set packet-duplication force enabled on a spoke and set packet-de-duplication enabled on the hub.

Security Fabric

Bug ID

Description

903922

Security Fabric physical and logical topology is slow to load when there are a lot of downstream devices, including FortiGates, FortiSwitches, FortiAPs, and endpoint device traffic. This is a GUI only display issue and does not impact operations of downstream devices.

1011833

FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages.

Workaround: disconnect the other concurrent administrator sessions to avoid overloading node process.

1120652

Fabric topology with two devices on different VDOMs but behind the same router shows wrong VDOM data on tooltip.

Workaround: Disable device-identification on that interface.

SSL VPN

Bug ID

Description

795381

FortiClient Windows cannot be launched with SSL VPN web portal.

941676

Incorrect character entered when using Shift+2 on Japanese keyboard during RDP session in SSL-VPN web mode.

Switch Controller

Bug ID

Description

947351

The FortiSwitch topology fails to load correctly and triggers Java errors in HTTPS logs when switches are connected via SFPs.

961142

An interface in FortiLink is flapping with MCLAG with DAC on an OPSFPP-T-05-PAB transceiver.

System

Bug ID

Description

782710

VLAN-over-VXLAN traffic was not being offloaded to NP7, causing performance issues due to increased CPU load.

882862

On FortiGate 400F, 600F, 900G, 3200F, and 3700F models, LAG interface members are not shutting down when the remote end interface (one member in the LAG) is admin down.

901621

On the NP7 platform, setting the interface configuration using set inbandwidth <x> or set outbandwidth <x> commands stops traffic flow.

Workaround: Change the NP7 ""default-qos-type"" setting from shaping to policing. This requires a restart of the device for the configuration to take effect.

config system npu
   set default-qos-type policing
end

921604

On the FortiGate 601F, the ports (x7) have no cables attached but the link LEDs are green.

1045866

The node daemon causes a CPU usage and memory usage issue when many interfaces are being edited or created at once.

1078119

Traffic is intermittently interrupted on virtual-vlan-switch on Soc5 based platforms when a multicast or broadcast packet is received.

1078541

The FortiFirewall 2600F model may become stuck after a fresh image burn. Upgrading from a previous version stills works.

Workaround: power cycle the unit.

1114594

On the FG-200G, SDNS is not able to connect to FortiGuard servers.

Workaround: use DNS instead of SDNS.

config system dns
    set protocol cleartext
end

1121548

Enabling device-identification also gets endpoint information, even though intermediate router exists on FG and endpoints.

Workaround: Disable device-identification on that interface.

Upgrade

Bug ID

Description

1055486

On the Firmware and Registration page, when performing a Fabric Upgrade using the GUI for the whole Fabric topology that includes managed FortiAPs and FortiSwitches, the root FortiGate may use an incorrect recommended image for FortiAP and FortiSwitch due to a parsing issue.

Workaround: initiate the Fabric Upgrade using the CLI.

User & Authentication

Bug ID

Description

1043189

Low-end FortiGate models with 2GB memory may enter conserve mode when processing large user store data with over 5000 user records and each record has a large number of IoT vulnerability data.

For example, the Users and Devices page or FortiNAC request can trigger the following API call that causes the httpsd process encounter a CPU usage issue and memory usage issue.

GET request /api/v2/monitor/user/device/query

VM

Bug ID

Description

899984

If FGTVM was deployed in UEFI boot mode, do not downgrade to any GA version earlier than 7.2.4.

1094274

FortiOS becomes unresponsive when sending IPv6 traffic over MLX5 network adapters due to incorrect WQE handling.

1119140

Incorrect deployment of DLP configurations occurs when FortiGate VMs are deployed on hypervisors with Intel Skylake processors.

Web Filter

Bug ID

Description

885222

HTTP sessions are logged as HTTPS in web filter logs when using an HTTP VIP server, causing incorrect protocol identification.

WiFi Controller

Bug ID

Description

869106

The layer 3 roaming feature may not work when the wireless controller is running multiple cw_acd processes (when the value of acd-process-count is not zero).

869978

In HA cluster of FGT-200F units with 'capwap-offload' enabled, traffic from tunnel SSID cannot pass after HA failover is triggered.

873273

The automatically connect option fails to function when the local radio connection is lost on some FortiGate models.

941691

Managed FortiSwitch detects multiple MACs using the same IP address.

ZTNA

Bug ID

Description

819987

Mapped drives become inaccessible after laptop reboots when using FortiGate ZTNA access proxy with FQDN destinations.