What's new for FortiOS 8.0.0
This section lists the new hardware acceleration features added to FortiOS 8.0.0:
-
L3/L4 header-based hashing for NP7-offloaded GRE tunnels, see L3/L4 header-based hashing for NP7-offloaded GRE tunnels.
-
ECMP hashing of NP7-offloaded GRE tunnels, see Support for ECMP hashing of NP7-offloaded GRE tunnels .
-
NP7 offloading of TCP and UDP sessions denied by firewall policies to reduce CPU usage, see NP7 offloading of TCP and UDP sessions denied by a firewall policy to reduce CPU usage.
-
NP7 VXLAN MAC flapping protection, see Enabling VXLAN MAC flapping protection.
-
NP7 traffic anomaly protection for TCP, UDP, and ICMP checksum error detection now includes the
allowoption to allow TCP, UDP, and ICMP packets with incorrect checksums, see config fp-anomaly.config system npu
config fp-anomaly
set tcp-csum-err {allow | drop | trap-to-host}
set udp-csum-err {allow | drop | trap-to-host}
set icmp-csum-err {allow | drop | trap-to-host}
end
-
The NP7 session accounting interval range is now 1 to 600 seconds. Increase the per-session accounting interval to reduce bandwidth usage. See Changing the per-session accounting interval.
config system npu
set session-acct-interval <seconds>
end
-
New options to control the bandwidth allowed for traffic flow between NP7 processors and the internal switch fabric (ISF). In some high-traffic configurations, limiting this bandwidth can improve performance, for example by reducing DSW drops and ReasmFails.
config system npu
set sw-np-rate <rate>
set sw-np-rate-unit {mbps | pps}
set sw-np-rate-burst <burst-rate}
end
For more information, see NP7 to ISF bandwidth control.
-
The default setting for
vlan-lookup-cachehas been changed todisable, see vlan-lookup-cache {disable | enable}.config system npu
set vlan-lookup-cache {disable | enable}
end
-
Dynamic shaping profiles are supported for traffic offloaded by NP7 or NP7Lite (SoC5) processors. This feature allows traffic control policies to be applied per user based on authentication details and bandwidth parameters from the RADIUS server. For more information, see Traffic shaping based on dynamic RADIUS VSAs.
-
Changes to outbandwidth or egress shaping profiles on a physical or VLAN interface do not take effect for IPsec tunnels or sessions that are already established and offloaded by NP7 or NP7Lite (SoC5) processors. To apply the updated egress shaping settings, you must manually flush or reinstall the affected IPsec SAs and clear any offloaded sessions. Doing this rebuilds the IPsec tunnel and associated sessions using the new interface shaping configuration. You can configure FortiGates with NP7Lite (SoC5) processors to automatically flush or reinstall the affected IPsec SAs and clear any offloaded sessions after changing the configuration of an outbandwidth or egress shaping profile, see Automatic NP7Lite (SOC5) egress shaping profile refresh.
-
The FortiGate 120G and 121G port17 to port24 interfaces can be configured to operate at 100Mbps, see Changing the speed of the port17 to port24 interfaces.