Fortinet white logo
Fortinet white logo

FortiOS Release Notes

Known issues

Known issues

Known issues are organized into the following categories:

To inquire about a particular bug or report a bug, please contact Customer Service & Support.

New known issues

The following issues have been identified in version 7.2.9.

Explicit Proxy

Bug ID

Description

890776

The GUI-explicit-proxy setting on the System > Feature Visibility page is not retained after a FortiGate reboot or upgrade.

1059899

When setting sec-default-action to accept on an initial explicit web proxy configuration after a factory reset, incoming traffic does not match the proxy policy and allows all traffic to pass.

Workaround: set sec-default-action to deny first in the CLI and then change the setting to accept.

FortiGate 6000 and 7000 platforms

Bug ID

Description

1060619

CSF is not working as expected.

GUI

Bug ID

Description

1055197

On FortiGate G series models with dual WAN links, the Interface Bandwidth widget may show an incorrect incoming and outgoing bandwidth count where the actual traffic does not match the display numbers.

HA

Bug ID

Description

1056138

On the FortiGate 120G and 121G, HA did not synchronize and the GUI HA page stuck loading when ha or mgmt interfaces used as the heartbeat interface.

Workaround: do not use ha or mgmt interfaces as the heartbeat interface.

1072440

Special branch supported models of FortiGate in an HA cluster with an empty HA password, upgrading from a special build GA version (version 7.0.x) to version 7.2.9 and version 7.2.10 GA can cause one of the members to not upgrade.

Impacted models: Please see a full list of Special branch supported models for FortiOS version 7.0.15.

Workaround: configure a valid HA password for the cluster before the upgrade, or manually upgrade the member that was impacted.

config system ha
    set password <new-password>
end

1084662

FFDB signatures keep flapping on all blades except the master FIM of the primary chassis.

Intrusion Prevention

Bug ID

Description

1069190

After upgrading to FortiOS version 7.2.9, FortiGate may experience a CPU usage issue due to IPS engine version 7.00342 when there are large amount of proxy inspected traffic using the application control and IPS sensor.

Workaround: downgrade the IPS engine to version 7.00341.

Routing

Bug ID

Description

1025201

FortiGate encounters a duplication issue in a hub and spoke configuration with set packet-duplication force enabled on a spoke and set packet-de-duplication enabled on the hub.

SSL VPN

Bug ID

Description

893190

When using 2FA for SSL VPN users, the FortiGate does not respect the two-factor token timeout configured in config system global. This causes the token to expire prematurely for different two-factor authentication types including: email, SMS, and FortiToken.

Upgrade

Bug ID

Description

1055486

On the Firmware and Registration page, when performing a Fabric Upgrade using the GUI for the whole Fabric topology that includes managed FortiAPs and FortiSwitches, the root FortiGate may use an incorrect recommended image for FortiAP and FortiSwitch due to a parsing issue.

Workaround: initiate the Fabric Upgrade using the CLI.

Existing known issues

The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.2.9.

Anti Virus

Bug ID

Description

937375

Unable to delete malware threat feeds using the CLI.

Explicit Proxy

Bug ID

Description

865828

The internet-service6-custom and internet-service6-custom-group options do not work with custom IPv6 addresses.

894557

In some cases, the explicit proxy policy list can take a long time to load due to a delay in retrieving the proxy statistics. This issue does not impact explicit proxy functionality.

Workaround: restart the WAD process, or temporarily disable the WAD debugging process (when FortiGate reboots, this process will need to be disabled again).

diagnose wad toggle

(use direct connect diagnose)

Firewall

Bug ID

Description

985508

When allow-traffic-redirect is enabled, redirect traffic that ingresses and egresses from the same interface may incorrectly get dropped if the source address of the incoming packet is different from the FortiGate's interface subnet and there is no firewall policy to allow the matched traffic.

Workaround: disable allow-traffic-redirect and create a firewall policy to allow traffic to ingress and egress for the same interface.

config system global
    set allow-traffic-redirect disable
end

992610

The source interface displays the name of the VDOM and local out traffic displays as forward traffic.

FortiGate 6000 and 7000 platforms

Bug ID

Description

790464

After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond.

951135

Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.12 to 7.2.6.

Upgrading the firmware of a FortiGate 6000 or 7000 FGCP HA cluster from 7.0.12 to 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for up to 30 minutes.

Before upgrading the firmware, disable uninterruptible-upgrade, then perform a normal firmware upgrade. During the upgrade process the FortiGates in the cluster will not allow traffic until all components (management board and FPCs or FIMs and FPMs) are upgraded and both FortiGates have restarted. This process can take up to 30 minutes.

951193

SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you cannot create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x.

If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis synchronizes its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version.

You can also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x.

For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement.

954881

Image synchronization failure happened after a factory reset on FortiGate 7000E/F .

976521

On FortiGate 6000 models, a CPU usage issue occurs in the node process when navigating a policy list with a large number (+7000) of policies in a VDOM.

994241

On FortiGate 7000F using FGSP and FGCP, when TCP traffic takes an asymmetric path, the TCP ACK and data packets might be dropped in NP7.

1056894

On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1070365

FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the session-sync-dev option, for example:

config system ha
    set session-sync-dev 1-M1 1-M2
end

The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the session-sync-dev command from mgmt-vdom to vsys_ha and the interfaces stop working as session sync interfaces.

You can work around the problem by re-configuring the session-sync-dev option on the FortiGate 7000F cluster (this resets the VDOM of the session sync interfaces to vsys_ha) and then retrieving the FortiGate configuration from FortiManager. This synchronizes the correct configuration to FortiManager.

GUI

Bug ID

Description

853352

On the View/Edit Entries slide-out pane (Policy & Objects > Internet Service Database dialog), users cannot scroll down to the end if there are over 100000 entries.

974988

FortiGate GUI should not display a license expired notification due to an expired FortiManager Cloud license if it still has a valid account level FortiManager Cloud license (function is not affected).

989512

When the number of users in the Firewall User monitor exceeds 2000, the search bar, column filters, and graphs are no longer displayed due to results being lazily loaded.

993890

The Node.JS daemon restarts with a kill ESRCH error on FortiGate after an upgrade.

999972

Edits that are made to IP Exemptions in IPS Signatures and Filters more than once on the Security Profiles > Intrusion Prevention page are not saved.

HA

Bug ID

Description

988944

On the Fabric Management page, the HA Secondary lists both primary and secondary FortiGate units.

998004

When the HA management interface is set a LAG, it is not synchronized to newly joining secondary HA devices.

1062433

SASE FortiGate's go out of synchronization after HTTP.Chunk.Length.Invalid was removed in the new FMWP package.

Workaround: run the di ips global rule reload command on the FortiGate's.

Hyperscale

Bug ID

Description

802182

After successfully changing the VLAN ID of an interface from the CLI, an error message similar to cmdb_txn_cache_data(query=log.npu-server,leve=1) failed may appear.

817562

NPD/LPMD cannot differentiate the different VRF's, considers as VRF 0 for all.

824071

ECMP does not load balance IPv6 traffic between two routes in a multi-VDOM setup.

843197

Output of diagnose sys npu-session list/list-full does not mention policy route information.

853258

Packets drop, and different behavior occurs between devices in an HA pair with ECMP next hop.

872146

The diagnose sys npu-session list command shows an incorrect policy ID when traffic is using an intra-zone policy.

920228

NAT46 NPU sessions are lost and traffic drops when a HA failover occurs.

IPsec VPN

Bug ID

Description

944600

CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink.

Log & Report

Bug ID

Description

1001583

The GUI is slow and reverts the input when multiple ports are added to a filter for destination ports.

Proxy

Bug ID

Description

910678

CPU usage issue in WAD caused by a high number of devices being detected by the device detection feature.

REST API

Bug ID

Description

1004136

Unable to fetch more than 1000 logs using an REST API GET request.

Routing

Bug ID

Description

896090

SD-WAN members can be out-of-sla after some retrieve times.

903444

The diagnose ip rtcache list command is no longer supported in the FortiOS 4.19 kernel.

924693

On the Network > SD-WAN > SD-WAN Rules page, member interfaces that are down are incorrectly shown as up. The tooltip on the interface shows the correct status.

Security Fabric

Bug ID

Description

1011833

FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages.

Workaround: Disconnect the other concurrent administrator sessions to avoid overloading node process.

1057862

FortiGate models with 2GB of memory that manage many extension devices (FortiSwitches and FortiAPs) may enter conserve mode due to the Node process experiencing a memory usage issue over time.

Workaround: Avoid loading Security Fabric widget, Security Rating, and Topology pages.

SSL VPN

Bug ID

Description

795381

FortiClient Windows cannot be launched with SSL VPN web portal.

941676

Japanese key input does not work correctly during RDP in SSL VPN web mode.

Switch Controller

Bug ID

Description

947351

The FortiSwitch topology is not loading correctly on the GUI.

961142

An interface in FortiLink is flapping with MCLAG with DAC on an OPSFPP-T-05-PAB transceiver.

System

Bug ID

Description

782710

Traffic going through a VLAN over VXLAN is not offloaded to NP7.

860460

On a redundant interface, traffic may drop with some NPU-offload enabled policies when the interface is not initialized properly.

882862

On FortiGate 400F, 600F, 900G, 3200F, and 3700F models, LAG interface members are not shutting down when the remote end interface (one member in the LAG) is admin down.

901621

On the NP7 platform, setting the interface configuration using set inbandwidth <x> or set outbandwidth <x> commands stops traffic flow.

Workaround: unset the inbandwidth and outbandwidth in the CLI:

config system interface
    edit <port>
        unset inbandwidth
        unset outbandwidth
    next
end

921604

On the FortiGate 601F, the ports (x7) have no cables attached but the link LEDs are green.

983467

FortiGate 60F and 61F models may experience a memory usage issue during a FortiGuard update due to the ips-helper process. This can cause the FortiGate to go into conserve mode if there is not enough free memory.

Workaround: User can disable CP acceleration to reduce the memory usage.

config ips global
    set cp-accel-mode none
end

1020921

When configuring an SNMP trusted host that matches the management Admin trusted host subnet, the GUI may give an incorrect warning that the current SNMP trusted host does not match. This is purely a GUI display issue and does not impact the actual SNMP traffic.

Workaround: If the trusted host is enabled on all administrative access, make sure the SNMP host IP is included in at least one of these trusted IP/subnets.

User & Authentication

Bug ID

Description

667150

When a remote LDAP user with Two-factor Authentication enabled and Authentication type 'FortiToken' tries to access the internet through firewall authentication, the web page does not receive the FortiToken notification or proceed to authenticate the user.

Workaround: click the Continue button on the authentication page after approving the FortiToken on the mobile device.

1043189

Low-end FortiGate models with 2GB memory may enter conserve mode when processing large user store data with over 5000 user records and each record has a large number of IoT vulnerability data.

For example, the Users and Devices page or FortiNAC request can trigger the following API call that causes the httpsd process encounter a CPU usage issue and memory usage issue.

GET request /api/v2/monitor/user/device/query

VM

Bug ID

Description

899984

If FGTVM was deployed in UEFI boot mode, do not downgrade to any GA version earlier than 7.2.4.

1073016

The OCI SDN connector cannot call the API to the Oracle service when an IAM role is enabled.

1082197

The FortiGate-VM on VMware ESXi equipped with an Intel E810-XXV network interface card (NIC) using SFP28 transceivers at 25G speed is unable to pass VLAN traffic when DPDK is enabled.

Web Filter

Bug ID

Description

885222

HTTP session is logged as HTTPS in web filter when VIP is used.

WiFi Controller

Bug ID

Description

869106

The layer 3 roaming feature may not work when the wireless controller is running multiple cw_acd processes (when the value of acd-process-count is not zero).

869978

CAPWAP tunnel traffic over tunnel SSID is dropped when offloading is enabled.

873273

The Automatically connect to nearest saved network option does not work as expected when FWF-60E client-mode local radio loses connection.

903922

Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation.

941691

Managed FortiSwitch detects multiple MACs using the same IP address.

1001104

FortiAP units repeated joining and leaving FortiGate HA cluster when the secondary FortiGate has stored FortiAP images.

1050915

When upgrading more than 30 managed FortiAPs at the same time using the Managed FortiAP page, the GUI may become slow and unresponsive when selecting the firmware.

Workaround: Upgrade the FortiAPs in smaller batches of up to 20 devices to avoid performance impacts.

ZTNA

Bug ID

Description

819987

SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting.

Known issues

Known issues

Known issues are organized into the following categories:

To inquire about a particular bug or report a bug, please contact Customer Service & Support.

New known issues

The following issues have been identified in version 7.2.9.

Explicit Proxy

Bug ID

Description

890776

The GUI-explicit-proxy setting on the System > Feature Visibility page is not retained after a FortiGate reboot or upgrade.

1059899

When setting sec-default-action to accept on an initial explicit web proxy configuration after a factory reset, incoming traffic does not match the proxy policy and allows all traffic to pass.

Workaround: set sec-default-action to deny first in the CLI and then change the setting to accept.

FortiGate 6000 and 7000 platforms

Bug ID

Description

1060619

CSF is not working as expected.

GUI

Bug ID

Description

1055197

On FortiGate G series models with dual WAN links, the Interface Bandwidth widget may show an incorrect incoming and outgoing bandwidth count where the actual traffic does not match the display numbers.

HA

Bug ID

Description

1056138

On the FortiGate 120G and 121G, HA did not synchronize and the GUI HA page stuck loading when ha or mgmt interfaces used as the heartbeat interface.

Workaround: do not use ha or mgmt interfaces as the heartbeat interface.

1072440

Special branch supported models of FortiGate in an HA cluster with an empty HA password, upgrading from a special build GA version (version 7.0.x) to version 7.2.9 and version 7.2.10 GA can cause one of the members to not upgrade.

Impacted models: Please see a full list of Special branch supported models for FortiOS version 7.0.15.

Workaround: configure a valid HA password for the cluster before the upgrade, or manually upgrade the member that was impacted.

config system ha
    set password <new-password>
end

1084662

FFDB signatures keep flapping on all blades except the master FIM of the primary chassis.

Intrusion Prevention

Bug ID

Description

1069190

After upgrading to FortiOS version 7.2.9, FortiGate may experience a CPU usage issue due to IPS engine version 7.00342 when there are large amount of proxy inspected traffic using the application control and IPS sensor.

Workaround: downgrade the IPS engine to version 7.00341.

Routing

Bug ID

Description

1025201

FortiGate encounters a duplication issue in a hub and spoke configuration with set packet-duplication force enabled on a spoke and set packet-de-duplication enabled on the hub.

SSL VPN

Bug ID

Description

893190

When using 2FA for SSL VPN users, the FortiGate does not respect the two-factor token timeout configured in config system global. This causes the token to expire prematurely for different two-factor authentication types including: email, SMS, and FortiToken.

Upgrade

Bug ID

Description

1055486

On the Firmware and Registration page, when performing a Fabric Upgrade using the GUI for the whole Fabric topology that includes managed FortiAPs and FortiSwitches, the root FortiGate may use an incorrect recommended image for FortiAP and FortiSwitch due to a parsing issue.

Workaround: initiate the Fabric Upgrade using the CLI.

Existing known issues

The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.2.9.

Anti Virus

Bug ID

Description

937375

Unable to delete malware threat feeds using the CLI.

Explicit Proxy

Bug ID

Description

865828

The internet-service6-custom and internet-service6-custom-group options do not work with custom IPv6 addresses.

894557

In some cases, the explicit proxy policy list can take a long time to load due to a delay in retrieving the proxy statistics. This issue does not impact explicit proxy functionality.

Workaround: restart the WAD process, or temporarily disable the WAD debugging process (when FortiGate reboots, this process will need to be disabled again).

diagnose wad toggle

(use direct connect diagnose)

Firewall

Bug ID

Description

985508

When allow-traffic-redirect is enabled, redirect traffic that ingresses and egresses from the same interface may incorrectly get dropped if the source address of the incoming packet is different from the FortiGate's interface subnet and there is no firewall policy to allow the matched traffic.

Workaround: disable allow-traffic-redirect and create a firewall policy to allow traffic to ingress and egress for the same interface.

config system global
    set allow-traffic-redirect disable
end

992610

The source interface displays the name of the VDOM and local out traffic displays as forward traffic.

FortiGate 6000 and 7000 platforms

Bug ID

Description

790464

After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond.

951135

Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.12 to 7.2.6.

Upgrading the firmware of a FortiGate 6000 or 7000 FGCP HA cluster from 7.0.12 to 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for up to 30 minutes.

Before upgrading the firmware, disable uninterruptible-upgrade, then perform a normal firmware upgrade. During the upgrade process the FortiGates in the cluster will not allow traffic until all components (management board and FPCs or FIMs and FPMs) are upgraded and both FortiGates have restarted. This process can take up to 30 minutes.

951193

SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you cannot create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x.

If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis synchronizes its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version.

You can also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x.

For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement.

954881

Image synchronization failure happened after a factory reset on FortiGate 7000E/F .

976521

On FortiGate 6000 models, a CPU usage issue occurs in the node process when navigating a policy list with a large number (+7000) of policies in a VDOM.

994241

On FortiGate 7000F using FGSP and FGCP, when TCP traffic takes an asymmetric path, the TCP ACK and data packets might be dropped in NP7.

1056894

On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1070365

FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the session-sync-dev option, for example:

config system ha
    set session-sync-dev 1-M1 1-M2
end

The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the session-sync-dev command from mgmt-vdom to vsys_ha and the interfaces stop working as session sync interfaces.

You can work around the problem by re-configuring the session-sync-dev option on the FortiGate 7000F cluster (this resets the VDOM of the session sync interfaces to vsys_ha) and then retrieving the FortiGate configuration from FortiManager. This synchronizes the correct configuration to FortiManager.

GUI

Bug ID

Description

853352

On the View/Edit Entries slide-out pane (Policy & Objects > Internet Service Database dialog), users cannot scroll down to the end if there are over 100000 entries.

974988

FortiGate GUI should not display a license expired notification due to an expired FortiManager Cloud license if it still has a valid account level FortiManager Cloud license (function is not affected).

989512

When the number of users in the Firewall User monitor exceeds 2000, the search bar, column filters, and graphs are no longer displayed due to results being lazily loaded.

993890

The Node.JS daemon restarts with a kill ESRCH error on FortiGate after an upgrade.

999972

Edits that are made to IP Exemptions in IPS Signatures and Filters more than once on the Security Profiles > Intrusion Prevention page are not saved.

HA

Bug ID

Description

988944

On the Fabric Management page, the HA Secondary lists both primary and secondary FortiGate units.

998004

When the HA management interface is set a LAG, it is not synchronized to newly joining secondary HA devices.

1062433

SASE FortiGate's go out of synchronization after HTTP.Chunk.Length.Invalid was removed in the new FMWP package.

Workaround: run the di ips global rule reload command on the FortiGate's.

Hyperscale

Bug ID

Description

802182

After successfully changing the VLAN ID of an interface from the CLI, an error message similar to cmdb_txn_cache_data(query=log.npu-server,leve=1) failed may appear.

817562

NPD/LPMD cannot differentiate the different VRF's, considers as VRF 0 for all.

824071

ECMP does not load balance IPv6 traffic between two routes in a multi-VDOM setup.

843197

Output of diagnose sys npu-session list/list-full does not mention policy route information.

853258

Packets drop, and different behavior occurs between devices in an HA pair with ECMP next hop.

872146

The diagnose sys npu-session list command shows an incorrect policy ID when traffic is using an intra-zone policy.

920228

NAT46 NPU sessions are lost and traffic drops when a HA failover occurs.

IPsec VPN

Bug ID

Description

944600

CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink.

Log & Report

Bug ID

Description

1001583

The GUI is slow and reverts the input when multiple ports are added to a filter for destination ports.

Proxy

Bug ID

Description

910678

CPU usage issue in WAD caused by a high number of devices being detected by the device detection feature.

REST API

Bug ID

Description

1004136

Unable to fetch more than 1000 logs using an REST API GET request.

Routing

Bug ID

Description

896090

SD-WAN members can be out-of-sla after some retrieve times.

903444

The diagnose ip rtcache list command is no longer supported in the FortiOS 4.19 kernel.

924693

On the Network > SD-WAN > SD-WAN Rules page, member interfaces that are down are incorrectly shown as up. The tooltip on the interface shows the correct status.

Security Fabric

Bug ID

Description

1011833

FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages.

Workaround: Disconnect the other concurrent administrator sessions to avoid overloading node process.

1057862

FortiGate models with 2GB of memory that manage many extension devices (FortiSwitches and FortiAPs) may enter conserve mode due to the Node process experiencing a memory usage issue over time.

Workaround: Avoid loading Security Fabric widget, Security Rating, and Topology pages.

SSL VPN

Bug ID

Description

795381

FortiClient Windows cannot be launched with SSL VPN web portal.

941676

Japanese key input does not work correctly during RDP in SSL VPN web mode.

Switch Controller

Bug ID

Description

947351

The FortiSwitch topology is not loading correctly on the GUI.

961142

An interface in FortiLink is flapping with MCLAG with DAC on an OPSFPP-T-05-PAB transceiver.

System

Bug ID

Description

782710

Traffic going through a VLAN over VXLAN is not offloaded to NP7.

860460

On a redundant interface, traffic may drop with some NPU-offload enabled policies when the interface is not initialized properly.

882862

On FortiGate 400F, 600F, 900G, 3200F, and 3700F models, LAG interface members are not shutting down when the remote end interface (one member in the LAG) is admin down.

901621

On the NP7 platform, setting the interface configuration using set inbandwidth <x> or set outbandwidth <x> commands stops traffic flow.

Workaround: unset the inbandwidth and outbandwidth in the CLI:

config system interface
    edit <port>
        unset inbandwidth
        unset outbandwidth
    next
end

921604

On the FortiGate 601F, the ports (x7) have no cables attached but the link LEDs are green.

983467

FortiGate 60F and 61F models may experience a memory usage issue during a FortiGuard update due to the ips-helper process. This can cause the FortiGate to go into conserve mode if there is not enough free memory.

Workaround: User can disable CP acceleration to reduce the memory usage.

config ips global
    set cp-accel-mode none
end

1020921

When configuring an SNMP trusted host that matches the management Admin trusted host subnet, the GUI may give an incorrect warning that the current SNMP trusted host does not match. This is purely a GUI display issue and does not impact the actual SNMP traffic.

Workaround: If the trusted host is enabled on all administrative access, make sure the SNMP host IP is included in at least one of these trusted IP/subnets.

User & Authentication

Bug ID

Description

667150

When a remote LDAP user with Two-factor Authentication enabled and Authentication type 'FortiToken' tries to access the internet through firewall authentication, the web page does not receive the FortiToken notification or proceed to authenticate the user.

Workaround: click the Continue button on the authentication page after approving the FortiToken on the mobile device.

1043189

Low-end FortiGate models with 2GB memory may enter conserve mode when processing large user store data with over 5000 user records and each record has a large number of IoT vulnerability data.

For example, the Users and Devices page or FortiNAC request can trigger the following API call that causes the httpsd process encounter a CPU usage issue and memory usage issue.

GET request /api/v2/monitor/user/device/query

VM

Bug ID

Description

899984

If FGTVM was deployed in UEFI boot mode, do not downgrade to any GA version earlier than 7.2.4.

1073016

The OCI SDN connector cannot call the API to the Oracle service when an IAM role is enabled.

1082197

The FortiGate-VM on VMware ESXi equipped with an Intel E810-XXV network interface card (NIC) using SFP28 transceivers at 25G speed is unable to pass VLAN traffic when DPDK is enabled.

Web Filter

Bug ID

Description

885222

HTTP session is logged as HTTPS in web filter when VIP is used.

WiFi Controller

Bug ID

Description

869106

The layer 3 roaming feature may not work when the wireless controller is running multiple cw_acd processes (when the value of acd-process-count is not zero).

869978

CAPWAP tunnel traffic over tunnel SSID is dropped when offloading is enabled.

873273

The Automatically connect to nearest saved network option does not work as expected when FWF-60E client-mode local radio loses connection.

903922

Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation.

941691

Managed FortiSwitch detects multiple MACs using the same IP address.

1001104

FortiAP units repeated joining and leaving FortiGate HA cluster when the secondary FortiGate has stored FortiAP images.

1050915

When upgrading more than 30 managed FortiAPs at the same time using the Managed FortiAP page, the GUI may become slow and unresponsive when selecting the firmware.

Workaround: Upgrade the FortiAPs in smaller batches of up to 20 devices to avoid performance impacts.

ZTNA

Bug ID

Description

819987

SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting.