Fortinet white logo
Fortinet white logo

FortiOS Release Notes

Changes in default behavior

Changes in default behavior

Bug ID

Description

896277

If a DHCP Interface is added as an SD-WAN Member inside an SD-WAN zone, before config static route on SD-WAN zone, FortiOS by default adds a default route with dhcp interface distance in the routing table using the gateway IP information retrieved from the DHCP server. This default route will take precedence over other default routes that have a higher AD.

872769

This release fixes the issue where proxy ARP stops working for a client connected to a dialup IPsec when the previous VPN was established and is deleted.

This fix introduces a correction in the behavior for the following setting:

config vpn ipsec phase2-interface
    edit <name>
        set route-overlap use-new
    next
end

Instead of allowing route-overlapping to occur in the routing table, it now deletes the old route when a duplicate connection is detected.

However, this may also introduce flapping and packet loss when this setting is enabled, and there are multiple dynamic IPsec interfaces configured in redundancy to the same destination with add-route also enabled in Phase1.

In this situation, use set route-overlap allow instead of set route-overlap use-new.

Changes in default behavior

Changes in default behavior

Bug ID

Description

896277

If a DHCP Interface is added as an SD-WAN Member inside an SD-WAN zone, before config static route on SD-WAN zone, FortiOS by default adds a default route with dhcp interface distance in the routing table using the gateway IP information retrieved from the DHCP server. This default route will take precedence over other default routes that have a higher AD.

872769

This release fixes the issue where proxy ARP stops working for a client connected to a dialup IPsec when the previous VPN was established and is deleted.

This fix introduces a correction in the behavior for the following setting:

config vpn ipsec phase2-interface
    edit <name>
        set route-overlap use-new
    next
end

Instead of allowing route-overlapping to occur in the routing table, it now deletes the old route when a duplicate connection is detected.

However, this may also introduce flapping and packet loss when this setting is enabled, and there are multiple dynamic IPsec interfaces configured in redundancy to the same destination with add-route also enabled in Phase1.

In this situation, use set route-overlap allow instead of set route-overlap use-new.