Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.0.4. For inquiries about a particular bug, please contact Customer Service & Support.

734917

When you configure a PIM multicast flow with a range of group addresses for SVIs and the group address range overlaps with a dynamic IGMPv3 group receiver that has joined groups in a different VLAN, then the dynamic IGMPv3 receiver will still receive multicast traffic unexpectedly even after leaving the joined groups.

748210 The MAC authentication bypass (MAB) sometimes does not work on the FS-424E when a third-party hub is disconnected and then reconnected.
759992 After restarting the FortiSwitch unit, memory usage increases, and the user cannot access the FortiSwitch unit with the CLI or GUI.
760536 The SNMP trap for monitoring the power supply failure and restoration is using the wrong object identifier (OID).
763953 After LDAP authentication is successful, the admin user cannot log in.
765197 The automatic topology creates an ISL trunk between two switches with the wrong value for the native VLAN.

769733

The getnext query does not work on OID .0/0.0.

770402 The diagnose switch mclag list command is reporting a different up time value than the diagnose switch trunk list and get system performance status commands.
771767 Trusted hosts with a mask other than /32 cannot access the FortiSwitch unit.

776675

  • FortiSwitchOS cannot use the NAS-Filter-Rule when it exceeds 65 characters.

  • If you specify more than one port or port range (for example, 10.105.0.106/24 100,200,300 or 10.105.0.106/24 100-200,300,700-900) when defining the source or destination in a dynamic ACL entry, FortiSwitchOS applies the first port or port range and ignores the rest.

  • If you specify the destination port after the any keyword, you must specify any 0.0.0.0/0 <port_number>. For example, instead of permit in TCP any to any 90 cnt, use permit in TCP any to any 0.0.0.0/0 90 cnt instead.

783151

There was an error in the definition of fsTrapLlvViolation in the SNMP MIB.

788021

The poe-pre-standard-detection setting is shown as disabled in the CLI but enabled on the hardware for the FS-1xxE, FS-1xxF, FS-5xxD, and FSR-112D-POE models.

Common vulnerabilities and exposures

FortiSwitchOS 7.0.4 is no longer vulnerable to the following CVEs:

  • CWE-329

  • CWE-347

  • CWE-916

Visit https://fortiguard.com/psirt for more information.

Resolved issues

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.0.4. For inquiries about a particular bug, please contact Customer Service & Support.

734917

When you configure a PIM multicast flow with a range of group addresses for SVIs and the group address range overlaps with a dynamic IGMPv3 group receiver that has joined groups in a different VLAN, then the dynamic IGMPv3 receiver will still receive multicast traffic unexpectedly even after leaving the joined groups.

748210 The MAC authentication bypass (MAB) sometimes does not work on the FS-424E when a third-party hub is disconnected and then reconnected.
759992 After restarting the FortiSwitch unit, memory usage increases, and the user cannot access the FortiSwitch unit with the CLI or GUI.
760536 The SNMP trap for monitoring the power supply failure and restoration is using the wrong object identifier (OID).
763953 After LDAP authentication is successful, the admin user cannot log in.
765197 The automatic topology creates an ISL trunk between two switches with the wrong value for the native VLAN.

769733

The getnext query does not work on OID .0/0.0.

770402 The diagnose switch mclag list command is reporting a different up time value than the diagnose switch trunk list and get system performance status commands.
771767 Trusted hosts with a mask other than /32 cannot access the FortiSwitch unit.

776675

  • FortiSwitchOS cannot use the NAS-Filter-Rule when it exceeds 65 characters.

  • If you specify more than one port or port range (for example, 10.105.0.106/24 100,200,300 or 10.105.0.106/24 100-200,300,700-900) when defining the source or destination in a dynamic ACL entry, FortiSwitchOS applies the first port or port range and ignores the rest.

  • If you specify the destination port after the any keyword, you must specify any 0.0.0.0/0 <port_number>. For example, instead of permit in TCP any to any 90 cnt, use permit in TCP any to any 0.0.0.0/0 90 cnt instead.

783151

There was an error in the definition of fsTrapLlvViolation in the SNMP MIB.

788021

The poe-pre-standard-detection setting is shown as disabled in the CLI but enabled on the hardware for the FS-1xxE, FS-1xxF, FS-5xxD, and FSR-112D-POE models.

Common vulnerabilities and exposures

FortiSwitchOS 7.0.4 is no longer vulnerable to the following CVEs:

  • CWE-329

  • CWE-347

  • CWE-916

Visit https://fortiguard.com/psirt for more information.