Changes in CLI
Bug ID |
Description |
---|---|
570152 |
Remove redundant |
587183 |
Remove the intelligent mode option from the IPS global configuration: config ips global set intelligent-mode {enable | disable} end |
640488 |
Add option to configure the maximum memory usage on the FortiGate's proxy for processing resources, such as block lists, allow lists, and external resources. config system global set proxy-resource-mode {enable | disable} end |
640620 |
In the |
645241 |
Remove config system npu setting prp set prp-port-in port-list set prp-port-out port-list end |
657726 |
Remove option to rate images by URL for web filter profile in the GUI and CLI. |
666855 |
FortiOS supports verifying client certificates with RSA-PSS series of signature algorithms, which causes problems with certain clients. Add attribute to control signature algorithms related to client authentication (only affects TLS 1.2): config vpn ssl settings set client-sigalgs {no-rsa-pss | all} end |
672183 |
Disable IHP IPsec anti-replay, and also use large MTU check values in NAT traversal sessions to avoid fragmentation and MTU exceptions. This affects the FG-3800D. config system npu set uesp-offload {enable | disable} end |
673049 |
When config vpn ipsec phase1 set localid-type address set localid <string> end |
673747 |
Support IPv6 in |
675511 |
Update |
677552 |
Add config system ha set failover-hold-time <integer> end |
682561 |
Add command, |
687197 |
Allows administrators to set requirements for any number of new characters in a new password, as opposed to a minimum of 4 unique new characters. config system password-policy set min-change-characters <integer> end The |
690981 |
Daily hit counts for central NAT and DNAT can now be displayed in the CLI using the following commands: # diagnose firewall iprope show 10000d <index> # diagnose firewall iprope show 100000 <index> |
695259 |
Rename the following setting: config system dns set dns-over-tls {disable | enable | enforce} end To: config system dns set protocol {cleartext | DoT | DoH} end |
695979 |
Support wildcard MAC addresses in firewall address for users to easily use pattern matching, like vendor prefix, to define a group of addresses. The MAC address range is now defined by specifying <start> - <end> in a single field, instead of defining a config firewall address edit "address" set type mac set macaddr 00:0c:29:8d:7e:e3 00:0c:**:8d:7*:e3 00:0c:29:8d:7e:e3-00:22:29:8d:7e:e next end |
700098 |
With the new IPsec kernel design, # diagnose vpn tunnel list name=hub1_0 ver=2 serial=a 22.1.6.1:4500->11.1.1.2:64916 tun_id=10.10.1.100 dst_mtu=1500 dpd-link=on remote_location=0.0.0.0 weight=1 .................................... src: 0:0.0.0.0-255.255.255.255:0 dst: 0:0.0.0.0-255.255.255.255:0 SA: ref=3 options=a26 type=00 soft=0 mtu=1358 expire=22685/0B replaywin=2048 seqno=312 esn=0 replaywin_lastseq=00000312 itn=0 qat=0 hash_search_len=1 life: type=01 bytes=0/0 timeout=43185/43200 dec: spi=4688373e esp=aes key=16 b399004593b5fe93fa70fda8cd053f28 ah=sha1 key=20 39ca51549367baed7d3aadda12deef8ed9b2a Codes: K - kernel, C - connected, S - static, R - RIP, B - BGP O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2 i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default Routing table for VRF=0 ...................................... B 10.1.100.0/24 [200/0] via 10.10.1.100 (recursive via hub1 tunnel 10.10.1.100), 6d04h41m |