Known issues
Known issues are organized into the following categories:
To inquire about a particular bug or report a bug, please contact Customer Service & Support.
New known issues
The following issues have been identified in version 7.4.5.
FortiGate 6000 and 7000 platforms
Bug ID |
Description |
---|---|
1016439 |
Enabling or disabling a vcluster causes some backup routes (proto = 20) to be lost when a routing table has a significant amount of routes (over 10000 routes). |
1048808 |
If the secondary reboots, after it rejoins the cluster SIP sessions are not resynchronized. |
1056894 | On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed. |
1078532 |
When upgrading the FG6001F platform, in some instances the slave chassis does not synchronize the FPC subscription license from master chassis. Workaround: use the |
GUI
Bug ID |
Description |
---|---|
1071907 |
There is no setting for the type option on the GUI for npu_vlink interface. |
HA
Bug ID |
Description |
---|---|
1084335 |
Existing API key may not work as expected with a 403 error wrong vdom displaying after upgrading to FortiOS v7.4.5 version. Workaround: Regenerate the API user key to resolve the permission error. |
IPsec VPN
Bug ID |
Description |
---|---|
1081951 | FortiGate encounters a steadily increasing IKED memory usage issue after upgrading to version 7.4.5. |
System
Bug ID |
Description |
---|---|
1046484 |
After shutting down FortiGate, the system automatically boots up again. |
1078541 |
The FortiFirewall 2600F model may become stuck after a fresh image burn. Upgrading from a previous version stills works. Workaround: power cycle the unit. |
VM
Bug ID |
Description |
---|---|
1094274 | FortiGate becomes unresponsive due to an error condition when sending IPv6 traffic. |
Existing known issues
The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.4.5.
Explicit Proxy
Bug ID |
Description |
---|---|
1026362 |
Web pages do not load when |
Firewall
Bug ID |
Description |
---|---|
959065 |
On the Policy & Objects > Traffic Shaping page, when deleting or creating a shaper, the counters for the other shapers are cleared. |
1007566 |
When the FortiGate has thousands of addresses and hundreds address groups, the GUI can take a few minutes to search for a specific address inside the address group dialog. Workaround: User can create the address group in the CLI instead by using the exact address name. User can also perform a search in the CLI using a partial match. For example: config firewall addrgrp edit address_group set member <pattern>? next end |
1057080 |
On the Firewall Policy page, search results do not display in an expanded format. |
FortiGate 6000 and 7000 platforms
Bug ID |
Description |
---|---|
790464 |
After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond. |
911244 |
FortiGate 7000E IPv6 routes may not be synchronized correctly among FIMs and FPMs. |
976521 |
On FortiGate 6000 models, a CPU usage issue occurs in the node process when navigating a policy list with a large number (+7000) of policies in a VDOM. |
1006759 |
After an HA failover, there is no IPsec route in the kernel. |
1018594 |
On FortiGate 7000, if Workaround: downgrade to version 7.2.x or 7.4.3. |
1026665 |
On the FortiGate 7000F platform with virtual clustering enabled and syslog logging configured, when running the |
1056894 |
On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed. |
1060619 |
CSF is not working as expected. |
1070365 |
FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the config system ha set session-sync-dev 1-M1 1-M2 end The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the You can work around the problem by re-configuring the |
GUI
Bug ID |
Description |
---|---|
853352 |
When viewing entries in slide-out window of the Policy & Objects > Internet Service Database page, users cannot scroll down to the end if there are over 100K entries. |
885427 |
Suggest showing the SFP status information on the faceplate of FGR-60F/60F-3G4G devices. |
HA
Bug ID |
Description |
---|---|
1000808 |
FortiGate in an HA setup has an unnecessary primary unit selection when a new member joins or reboots one member in the VC cluster when the VC has more than 2 units. |
1054041 |
On FortiGate's in an HA environment, DHCP clients can not connect to the DHCP server. |
1084662 |
FFDB signatures keep flapping on all blades except the master FIM of the primary chassis. |
Hyperscale
Bug ID |
Description |
---|---|
817562 |
NPD/LPMD cannot differentiate the different VRFs, and considers all VRFs as 0. |
896203 |
The parse error, |
961328 |
FortiGate does not choose a random port when set to random mode. |
977376 |
FG-4201F has a 10% performance drop during a CPS test case with DoS policy. |
1024274 |
When Hyperscale logging is enabled with multicast log, the log is not sent to servers that are configured to receive multicast logs. |
1024902 |
After FTP traffic passes, the |
1025908 |
When running FGSP setup, the session count is approximately 50% less on the peer device. |
IPsec VPN
Bug ID |
Description |
---|---|
866413 |
Traffic over GRE tunnel over IPsec tunnel, or traffic over IPsec tunnel with GRE encapsulation is not offloaded on NP7-based units. |
897871 |
GRE over IPsec does not work in transport mode. |
944600 |
CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink. |
970703 |
FortiGate 6K and 7K models do not support IPsec VPN over vdom-link/npu-vlink. |
Log & Report
Bug ID |
Description |
---|---|
1010244 |
When uploading the log file to the FTP server, some parts of the log files are not included in the upload. |
Proxy
Bug ID |
Description |
---|---|
910678 |
CPU usage issue in WAD caused by a high number of devices being detected by the device detection feature. |
1060812 |
When Proxy-mode inline IPS scanning is enabled, the botnet check within the IPS profile does not work as expected when the IPS profile is applied to a proxy-based inspection policy using certificate inspection. Workaround: disable |
Routing
Bug ID |
Description |
---|---|
903444 |
The |
Security Fabric
Bug ID |
Description |
---|---|
948322 |
After deauthorizing a downstream FortiGate from the System > Firmware & Registration page, the page may appear to be stuck to loading. Workaround: perform a full page refresh to allow the page to load again. |
1011833 |
FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages. |
1021684 |
In some cases, the Security Fabric topology does not load properly and displays a Failed to load Topology Results error. |
System
Bug ID |
Description |
---|---|
912383 |
FGR-70F and FGR-70F-3G4G failed to perform regular reboot process (using |
983467 |
FortiGate 60F and 61F models may experience a memory usage issue during a FortiGuard update due to the ips-helper process. This can cause the FortiGate to go into conserve mode if there is not enough free memory. Workaround: User can disable CP acceleration to reduce the memory usage. config ips global set cp-accel-mode none end |
1015698 |
On FortiGate 601F models, the X5 - X8 interfaces with 25G SFP28 DAC are down after upgrading to version 7.4.4 or later. |
1021903 |
After an interface role change, the updated role does not show in the le-switch member list. |
1057131 |
A FortiGuard update can cause the system to not operate as expected if the FortiGate is already in conserve mode. Users may need to reboot the FortiGate. |
Upgrade
Bug ID |
Description |
---|---|
1027462 |
When restoring an FortiGate, the 7.4.1 config file with deprecated Inline CASB entries displays errors messages and causes the confsyncd to not function as expected. |
1031574 |
During a graceful upgrade, the confsync daemon and updated daemon encounter a memory usage issue, causing a race condition. |
User & Authentication
Bug ID |
Description |
---|---|
667150 |
On the User & Authentication > User Definition page, when a remote LDAP user with Two-factor Authentication enabled and Authentication type FortiToken tries to access the internet through firewall authentication, the web page does not receive the FortiToken notification or proceed to authenticate the user. Workaround: click the Continue button on the authentication page after approving the FortiToken on the mobile device. |
884462 |
NTLM authentication does not work with Chrome. |
972391 |
RADIUS group is not properly displayed as used. |
1080234 |
For FortiGate (versions 7.2.10 and 7.4.5 and later) and FortiNAC (versions 9.2.8 and 9.4.6 and prior) integration, when testing connectivity/user credentials against FortiNAC that acts as a RADIUS server, the FortiGate GUI and CLI returns an invalid secret for the server error. This error is expected when the FortiGate acts as the direct RADIUS client to the FortiNAC RADIUS server due to a change in how FortiGate handles RADIUS protocol in these versions. However, the end-to-end integration for the clients behind the FortiGate and FortiNAC is not impacted. Workaround: confirm the connectivity between the end clients and FortiNAC by checking if the clients can still be authorized against the FortiNAC as normal. |
VM
Bug ID |
Description |
---|---|
978021 |
VNI length is zero in the GENEVE header when in FTP passive mode. |
1082197 |
The FortiGate-VM on VMware ESXi equipped with an Intel E810-XXV network interface card (NIC) using SFP28 transceivers at 25G speed is unable to pass VLAN traffic when DPDK is enabled. |
WiFi Controller
Bug ID |
Description |
---|---|
814541 |
When there are extra large number of managed FortiAP devices (over 500) and large number of WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long time to load. This issue does not impact FortiAP operation. |
869978 |
CAPWAP tunnel traffic over tunnel SSID is dropped when offloading is enabled. |
903922 |
Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation. |
964757 |
Clients randomly unable to connect to 802.1X SSID when FortiAP has a DTLS policy enabled. |
972093 |
RADIUS accounting data usage is different between the bridge and tunnel VAP. |
1050915 |
When upgrading more than 30 managed FortiAPs at the same time using the Managed FortiAP page, the GUI may become slow and unresponsive when selecting the firmware. Workaround: Upgrade the FortiAPs in smaller batches of up to 20 devices to avoid performance impacts. |
ZTNA
Bug ID |
Description |
---|---|
819987 |
SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting. |
1020084 |
Health check on the ZTNA realserver does not work as expected if a blackhole route is added to the realserver address. |