Known issues
The following issues have been identified in version 7.2.8. To inquire about a particular bug or report a bug, please contact Customer Service & Support.
Anti Virus
Bug ID |
Description |
---|---|
937375 |
Unable to delete malware threat feeds using the CLI. |
Explicit Proxy
Bug ID |
Description |
---|---|
865828 |
The |
890776 |
The GUI-explicit-proxy setting on the System > Feature Visibility page is not retained after a FortiGate reboot or upgrade. |
894557 |
In some cases, the explicit proxy policy list can take a long time to load due to a delay in retrieving the proxy statistics. This issue does not impact explicit proxy functionality. Workaround: restart the WAD process, or temporarily disable the WAD debugging process (when FortiGate reboots, this process will need to be disabled again). diagnose wad toggle (use direct connect diagnose) |
1001700 |
If explicit webproxy uses SAML authentication and the PAC file is enabled at the same time, the browser will report a too many redirects error when trying to visit any websites. |
Firewall
Bug ID |
Description |
---|---|
935034 |
The clock skew tolerance is not reflected. |
951984 |
For local out DNAT traffic, the best output route may not be found. |
985508 |
When Workaround: disable config system global set allow-traffic-redirect disable end |
1014584 |
On the Policy & Objects > Firewall Policy page, firewall policies with FQDN show as unresolved in the table. |
FortiGate 6000 and 7000 platforms
Bug ID |
Description |
---|---|
638799 |
The DHCPv6 client does not work with vcluster2. |
790464 |
After a failover, ARP entries are removed from all slots when an ARP query of a single slot does not respond. |
885205 |
IPv6 ECMP is not supported for the FG-6000F and FG-7000E platforms. IPv6 ECMP is supported for the FG-7000F platform. |
940541 |
A permanent MAC address is used instead of an HA virtual MAC address during automation. |
951135 |
Graceful upgrade of a FortiGate 6000 or 7000 FGCP HA cluster is not supported when upgrading from FortiOS 7.0.12 to 7.2.6. Upgrading the firmware of a FortiGate 6000 or 7000 FGCP HA cluster from 7.0.12 to 7.2.6 should be done during a maintenance window, since the firmware upgrade process will disrupt traffic for up to 30 minutes. Before upgrading the firmware, disable |
951193 |
SLBC for FortiOS 7.0 and 7.2 uses different FGCP HA heartbeat formats. Because of the different heartbeat formats, you cannot create an FGCP HA cluster of two FortiGate 6000s or 7000s when one chassis is running FortiOS 7.0.x and the other is running FortiOS 7.2.x. Instead, to form an FGCP HA cluster, both chassis must be running FortiOS 7.0.x or 7.2.x. If two chassis are running different patch releases of FortiOS 7.0 or 7.2 (for example, one chassis is running 7.2.5 and the other 7.2.6), they can form a cluster. When the cluster is formed, FGCP elects one chassis to be the primary chassis. The primary chassis synchronizes its firmware to the secondary chassis. As a result, both chassis will be running the same firmware version. You can also form a cluster if one chassis is running FortiOS 7.2.x and the other is running 7.4.x. For best results, both chassis should be running the same firmware version, although as described above, this is not a requirement. |
954881 |
Image synchronization failure happened after a factory reset on FortiGate 7000E/F . |
976521 |
On FortiGate 6000 models, a CPU usage issue occurs in the node process when navigating a policy list with a large number (+7000) of policies in a VDOM. |
983236 |
Under normal conditions, a FortiGate 6000 or 7000 may generate event log messages due to a known issue with a feature added to FortiOS 7.2 and 7.4. The feature is designed to create event log messages for certain DP channel traffic issues but also generates event log messages when the DP processor detects traffic anomalies that are part of normal traffic processing. This causes the event log messages to detect false positives that don't affect normal operation. For example, DP channel 15 RX drop detected! messages can be created when a routine problem is detected with a packet that would normally cause the DP processor to drop the packet. Similar discard message may also appear if the DP buffer is full. |
994241 |
On FortiGate 7000F using FGSP and FGCP, when TCP traffic takes an asymmetric path, the TCP ACK and data packets might be dropped in NP7. |
997161 |
On FortiGate 6000 FPCs and FortiGate 7000 FPMs the node process may consume large amounts of CPU resources, possibly affecting FPC or FPM performance. (You can run the Workaround: use the following commands to disable automatic security rating results submission and to disable running scheduled security ratings checks: config system global set security-rating-result-submission disable set security-rating-run-on-schedule disable end Once you have entered these commands, use the following command to restart the node process:
|
1003879 |
Incorrect SLBC traffic-related statistics may be displayed on the FortiGate 6000 or FortiGate 7000 GUI (for example, in a dashboard widgets). This can occur if an FPC or FPM is not correctly registered for statistic collection during startup. This is purely a GUI display issue and does not impact system operation. To work around this display issue, enter the command |
1025652 |
On the FortiGate 7000E platform, after upgrading firmware from 7.2.8 to 7.4.x, the CLI of the secondary FIM and the FPMs in the secondary chassis of an FGCP cluster may display This firmware failed signature validation. This error message is displayed because of a known issue. The firmware is valid and the FortiGate 7000E cluster will operate normally. |
1047553 |
HA remote access does not work as expected when |
1056894 |
On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed. |
1070365 |
FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the config system ha set session-sync-dev 1-M1 1-M2 end The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the You can work around the problem by re-configuring the |
GUI
Bug ID |
Description |
---|---|
853352 |
When viewing entries in the slide-out window of the Policy & Objects > Internet Service Database page, users cannot scroll down to the end if there are over 100000 entries. |
974988 |
FortiGate GUI should not display a license expired notification due to an expired FortiManager Cloud license if it still has a valid account level FortiManager Cloud license (function is not affected). |
999972 |
Edits that are made to IP Exemptions in IPS Signatures and Filters more than once on the Security Profiles > Intrusion Prevention page are not saved. |
1013866 |
The category action change is not saved if the category number is the same as the existing entry ID. |
HA
Bug ID |
Description |
---|---|
825380 |
When workspace configuration save mode is set to manual in the System > Settings, configuration changes made on the primary unit and then saved do not synchronize with the secondary unit when one of the cluster units are rebooted or shutdown after the change. Workaround: set the workspace configuration mode to automatic. |
858683 |
FortiGate in A-P HA mode with |
929486 |
When Configuration save mode is set to Manual, any firewall policy change will make the cluster out-of-sync. |
940400 |
SCTP traffic is not forwarded back to the session owner (FGSP asymmetric traffic with IPS , NAT mode, and SCTP). |
988944 |
On the Fabric Management page, the HA Secondary lists both primary and secondary FortiGate units. |
998004 |
When the HA management interface is set a LAG, it is not synchronized to newly joining secondary HA devices. |
1000001 |
A secondary HA unit may go into conserve mode when joining an HA cluster if the FortiGate's configuration is large. |
1007934 |
FortiGate may experience a memory usage issue with the node daemon once a connection is closed. |
1011674 |
Upgrading from 7.0.14 or 7.2.8 on the HA secondary device will fail with BIOS security level 2. The image is marked |
Hyperscale
Bug ID |
Description |
---|---|
802182 |
After successfully changing the VLAN ID of an interface from the CLI, an error message similar to |
817562 |
NPD/LPMD cannot differentiate the different VRF's, considers as VRF 0 for all. |
824071 |
ECMP does not load balance IPv6 traffic between two routes in a multi-VDOM setup. |
843197 |
Output of |
853258 |
Packets drop, and different behavior occurs between devices in an HA pair with ECMP next hop. |
872146 |
The |
920228 |
NAT46 NPU sessions are lost and traffic drops when a HA failover occurs. |
936747 |
Connections per second (CPS) performance of SIP sessions accepted by hyperscale firewall policies with EIM and EIF disabled that include overload with port block allocation (PBA) GCN IP pools is lower than expected. Workaround: enter the following command for each NP7 processor to resolve the performance issue. # diagnose npu np7 setreg <npu_#> nss.nss_thrd_ctrl.thrd_ctrl 0xF Where The configuration changes from entering these diagnose commands are reset if the FortiGate restarts. After a system restart, just re-enter the diagnose commands. |
994019 |
Harpin traffic may not work due to a rare situation caused by a race condition. |
IPsec VPN
Bug ID |
Description |
---|---|
944600 |
CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink. |
954614 |
IPsec phase 2 negotiation fails with |
Log & Report
Bug ID |
Description |
---|---|
872493 |
Disk logging files are cached in the kernel, causing high memory usage. |
938396 |
|
1001583 |
The GUI experiences a performance issue and reverts the last input when multiple ports are added to a filter for destination ports. |
1010244 |
When uploading the log file to the FTP server, some parts of the log files are not included in the upload. |
1018392 |
A memory usage issue in the fgtlogd daemon causes FortiGate to enter into conserve mode. |
Proxy
Bug ID |
Description |
---|---|
910678 |
CPU usage issue in WAD caused by a high number of devices being detected by the device detection feature. |
922093 |
CPU usage issue in WAD caused by source port exhaustion when using WAN optimization. |
REST API
Bug ID |
Description |
---|---|
859680 |
In an HA setup with vCluster, a CMDB API request to the primary cluster does not synchronize the configuration to the secondary cluster. |
920260 |
SD-WAN interfaces should be denoted in the interface statistics API. |
1004136 |
Unable to fetch more than 1000 logs using an REST API GET request. |
Routing
Bug ID |
Description |
---|---|
896090 |
SD-WAN members can be out-of-sla after some retrieve times. |
903444 |
The |
910656 |
Router information in the BGP summary still shows removed BGP neighbor/peer configuration. |
924693 |
On the Network > SD-WAN > SD-WAN Rules page, member interfaces that are down are incorrectly shown as up. The tooltip on the interface shows the correct status. |
1003756 |
When creating a rule on the Network > Routing Objects page, the Prefix-list is set to 0.0.0.0 0.0.0.0 when an incorrect format is entered in the Prefix field. |
1023878 |
SD-WAN SLA shows intermittent disruptions of packet loss on all links simultaneously, even though there is no actual packet loss. |
Security Fabric
Bug ID |
Description |
---|---|
958429 |
On the Security Fabric > Automation page, the webhook request header does not contain |
1011833 |
FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages. Workaround: Disconnect the other concurrent administrator sessions to avoid overloading node process. |
1046726 |
The |
1057862 |
FortiGate models with 2GB of memory that manage many extension devices (FortiSwitches and FortiAPs) may enter conserve mode due to the Node process experiencing a memory usage issue over time. Workaround: Avoid loading Security Fabric widget, Security Rating, and Topology pages. |
SSL VPN
Bug ID |
Description |
---|---|
795381 |
FortiClient Windows cannot be launched with SSL VPN web portal. |
905050 |
Intermittent behavior in samld due to an absent crucial parameter in the SP login response may lead to SSL VPN users experiencing disconnections. |
941676 |
Japanese key input does not work correctly during RDP in SSL VPN web mode. |
947210 |
Application sslvpnd |
Switch Controller
Bug ID |
Description |
---|---|
947351 |
The FortiSwitch topology is not loading correctly on the GUI. |
961142 |
An interface in FortiLink is flapping with MCLAG with DAC on an OPSFPP-T-05-PAB transceiver. |
1000663 |
The switch-controller managed-switch ports' configurations are getting removed after each reboot. |
System
Bug ID |
Description |
---|---|
782710 |
Traffic going through a VLAN over VXLAN is not offloaded to NP7. |
860460 |
On a redundant interface, traffic may drop with some NPU-offload enabled policies when the interface is not initialized properly. |
861144 |
|
882862 |
On FortiGate 400F, 600F, 900G, 3200F, and 3700F models, LAG interface members are not shutting down when the remote end interface (one member in the LAG) is admin down. |
885189 |
On FortiGate, support is only provided for a single |
887940 |
Status light is not showing on the FortiGate 60F or 100F after a cold and warm reboot. |
901621 |
On the NP7 platform, setting the interface configuration using Workaround: unset the config system interface edit <port> unset inbandwidth unset outbandwidth next end |
901721 |
In a certain edge case, traffic directed towards a VLAN interface could cause a kernel interruption. |
921604 |
On the FortiGate 601F, the ports (x7) have no cables attached but the link LEDs are green. |
925554 |
On the Network > Interfaces page, hardware and software switches show VLAN interfaces as down instead of up. The actual status of the VLAN interface can be verified using the command line. |
939013 |
SNMP walk of the entire MIB fails when the configuration has split-port and a large number of interfaces. |
967436 |
DAC cable between FortiGate and FortiSwitch stops working after upgrading from 7.2.6 to 7.2.7. |
983467 |
FortiGate 60F and 61F models may experience a memory usage issue during a FortiGuard update due to the ips-helper process. This can cause the FortiGate to go into conserve mode if there is not enough free memory. Workaround: User can disable CP acceleration to reduce the memory usage. config ips global set cp-accel-mode none end |
1006024 |
Administrator accounts using an admin profile with only FortiGuard Updates read-write permissions cannot open the FortiGuard page. |
1010328 |
Fgfmsd does not function as expected when the type is set as |
1012518 |
Some FortiGate models on NP6/NP6Lite/NP6xLite platforms experience unexpected behavior due to certain traffic conditions after upgrading to 7.2.8. Traffic may be interrupted momentarily. Workaround: Users impacted by this issue can contact Fortinet Support to request a special build with a fix for this issue. Alternatively, users can disable the processing of traffic by the IPS engine’s nTurbo using the following command: config ips global set np-accel-mode none end |
1014624 |
On the FortiGate 1800F, the 40G interface's status is DOWN after upgrading to 7.2.8. |
1020921 |
When configuring an SNMP trusted host that matches the management Admin trusted host subnet, the GUI may give an incorrect warning that the current SNMP trusted host does not match. This is purely a GUI display issue and does not impact the actual SNMP traffic. Workaround: If the trusted host is enabled on all administrative access, make sure the SNMP host IP is included in at least one of these trusted IP/subnets. |
1041457 |
The kernel 4.19 cannot concurrently reassemble IPv4 fragments for a source IP with more than 64 destination IP addresses. |
Upgrade
Bug ID |
Description |
---|---|
955835 |
When |
925567 |
When upgrading multiple firmware versions in the GUI, the Follow upgrade path option does not respect the recommended upgrade path. |
977281 |
After the FortiGate in an HA environment is upgraded using the Fabric upgrade feature, the GUI might incorrectly show the status Downgrade to 7.2.X shortly, even though the upgrade has completed. This is only a display issue; the Fabric upgrade will not recur unless it is manually scheduled. Workaround: Confirm the Fabric upgrade status to make sure that it is not enabled: config system federated-upgrade set status disabled end |
User & Authentication
Bug ID |
Description |
---|---|
667150 |
When a remote LDAP user with Two-factor Authentication enabled and Authentication type 'FortiToken' tries to access the internet through firewall authentication, the web page does not receive the FortiToken notification or proceed to authenticate the user. Workaround: click the Continue button on the authentication page after approving the FortiToken on the mobile device. |
933622 |
The FortiGate does not send the user's IP address to the TACACS+ server during an authorization request. |
1003405 |
When there are over 5000 firewall users, the minimized Firewall Users widget on the dashboard does not display the donut chart or number of users. Expanding the widget to full screen displays all users. |
1012337 |
Client IP addresses are sent in an invalid format which some servers cannot accept. |
1043189 |
Low-end FortiGate models with 2GB memory may enter conserve mode when processing large user store data with over 5000 user records and each record has a large number of IoT vulnerability data. For example, the Users and Devices page or FortiNAC request can trigger the following API call that causes the httpsd process encounter a CPU usage issue and memory usage issue. GET request /api/v2/monitor/user/device/query |
VM
Bug ID |
Description |
---|---|
899984 |
If FGTVM was deployed in UEFI boot mode, do not downgrade to any GA version earlier than 7.2.4. |
923061 |
IPsec tunnels on AWS have TX errors incremented every 30 seconds. |
1082197 |
The FortiGate-VM on VMware ESXi equipped with an Intel E810-XXV network interface card (NIC) using SFP28 transceivers at 25G speed is unable to pass VLAN traffic when DPDK is enabled. |
Web Filter
Bug ID |
Description |
---|---|
885222 |
HTTP session is logged as HTTPS in web filter when VIP is used. |
1004985 |
The webfilter cookie override trigger process had no issue observed and an override entry was created in the FortiGate, but client access was kept blocked by the old profile and the client received a replacement message with an override link just like the initial access to trigger the override. |
WiFi Controller
Bug ID |
Description |
---|---|
869106 |
The layer 3 roaming feature may not work when the wireless controller is running multiple cw_acd processes (when the value of |
869978 |
CAPWAP tunnel traffic over tunnel SSID is dropped when offloading is enabled. |
873273 |
The Automatically connect to nearest saved network option does not work as expected when FWF-60E client-mode local radio loses connection. |
903922 |
Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation. |
938840 |
Excessive |
941691 |
Managed FortiSwitch detects multiple MACs using the same IP address. |
949682 |
Intermittent traffic disruption observed in cw_acd caused by a rare error condition. |
1001104 |
FortiAP units repeated joining and leaving FortiGate HA cluster when the secondary FortiGate has stored FortiAP images. |
1031659 |
WiFi clients are disconnected from SSIDs due to an error condition in the daemon hostapd process. |
1050915 |
When upgrading more than 30 managed FortiAPs at the same time using the Managed FortiAP page, the GUI may become slow and unresponsive when selecting the firmware. Workaround: Upgrade the FortiAPs in smaller batches of up to 20 devices to avoid performance impacts. |
ZTNA
Bug ID |
Description |
---|---|
819987 |
SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting. |