Fortinet white logo
Fortinet white logo

FortiOS Release Notes

Known issues

Known issues

Known issues are organized into the following categories:

To inquire about a particular bug or report a bug, please contact Customer Service & Support.

New known issues

The following issues have been identified in version 7.4.5.

FortiGate 6000 and 7000 platforms

Bug ID

Description

1016439

Enabling or disabling a vcluster causes some backup routes (proto = 20) to be lost when a routing table has a significant amount of routes (over 10000 routes).

1048808

If the secondary reboots, after it rejoins the cluster SIP sessions are not resynchronized.

1056894 On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1078532

When upgrading the FG6001F platform, in some instances the slave chassis does not synchronize the FPC subscription license from master chassis.

Workaround: use the execute update-now command.

GUI

Bug ID

Description

1071907

There is no setting for the type option on the GUI for npu_vlink interface.

HA

Bug ID

Description

1084335

Existing API key may not work as expected with a 403 error wrong vdom displaying after upgrading to FortiOS v7.4.5 version.

Workaround: Regenerate the API user key to resolve the permission error.

IPsec VPN

Bug ID

Description

1081951 FortiGate encounters a steadily increasing IKED memory usage issue after upgrading to version 7.4.5.

System

Bug ID

Description

1046484

After shutting down FortiGate, the system automatically boots up again.

1078541

The FortiFirewall 2600F model may become stuck after a fresh image burn. Upgrading from a previous version stills works.

Workaround: power cycle the unit.

VM

Bug ID

Description

1094274 FortiGate becomes unresponsive due to an error condition when sending IPv6 traffic.

Existing known issues

The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.4.5.

Explicit Proxy

Bug ID

Description

1026362

Web pages do not load when persistent-cookie is disabled for session-cookie-based authentication with captive-portal.

Firewall

Bug ID

Description

959065

On the Policy & Objects > Traffic Shaping page, when deleting or creating a shaper, the counters for the other shapers are cleared.

1007566

When the FortiGate has thousands of addresses and hundreds address groups, the GUI can take a few minutes to search for a specific address inside the address group dialog.

Workaround: User can create the address group in the CLI instead by using the exact address name. User can also perform a search in the CLI using a partial match. For example:

config firewall addrgrp
    edit address_group
        set member <pattern>?
    next
end

1057080

On the Firewall Policy page, search results do not display in an expanded format.

FortiGate 6000 and 7000 platforms

Bug ID

Description

790464

After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond.

911244

FortiGate 7000E IPv6 routes may not be synchronized correctly among FIMs and FPMs.

976521

On FortiGate 6000 models, a CPU usage issue occurs in the node process when navigating a policy list with a large number (+7000) of policies in a VDOM.

1006759

After an HA failover, there is no IPsec route in the kernel.

1018594

On FortiGate 7000, if gtp-mode is enabled and then disabled, after disabling gtp-enhanced mode and rebooting the device, traffic is disrupted on the FIM and cannot be recovered.

Workaround: downgrade to version 7.2.x or 7.4.3.

1026665

On the FortiGate 7000F platform with virtual clustering enabled and syslog logging configured, when running the diagnose log test command from a primary vcluster VDOM, some FPMs may not send log messages to the configured syslog servers.

1056894

On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1060619

CSF is not working as expected.

1070365

FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the session-sync-dev option, for example:

config system ha
    set session-sync-dev 1-M1 1-M2
end

The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the session-sync-dev command from mgmt-vdom to vsys_ha and the interfaces stop working as session sync interfaces.

You can work around the problem by re-configuring the session-sync-dev option on the FortiGate 7000F cluster (this resets the VDOM of the session sync interfaces to vsys_ha) and then retrieving the FortiGate configuration from FortiManager. This synchronizes the correct configuration to FortiManager.

GUI

Bug ID

Description

853352

When viewing entries in slide-out window of the Policy & Objects > Internet Service Database page, users cannot scroll down to the end if there are over 100K entries.

885427

Suggest showing the SFP status information on the faceplate of FGR-60F/60F-3G4G devices.

HA

Bug ID

Description

1000808

FortiGate in an HA setup has an unnecessary primary unit selection when a new member joins or reboots one member in the VC cluster when the VC has more than 2 units.

1054041

On FortiGate's in an HA environment, DHCP clients can not connect to the DHCP server.

1084662

FFDB signatures keep flapping on all blades except the master FIM of the primary chassis.

Hyperscale

Bug ID

Description

817562

NPD/LPMD cannot differentiate the different VRFs, and considers all VRFs as 0.

896203

The parse error, NPD-0:NPD PARSE ADDR GRP gmail.com MEMBER ERR, appears after rebooting the system.

961328

FortiGate does not choose a random port when set to random mode.

977376

FG-4201F has a 10% performance drop during a CPS test case with DoS policy.

1024274

When Hyperscale logging is enabled with multicast log, the log is not sent to servers that are configured to receive multicast logs.

1024902

After FTP traffic passes, the npu-session stat does not display the accurate amount of actual sessions on FortiGate.

1025908

When running FGSP setup, the session count is approximately 50% less on the peer device.

IPsec VPN

Bug ID

Description

866413

Traffic over GRE tunnel over IPsec tunnel, or traffic over IPsec tunnel with GRE encapsulation is not offloaded on NP7-based units.

897871

GRE over IPsec does not work in transport mode.

944600

CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink.

970703

FortiGate 6K and 7K models do not support IPsec VPN over vdom-link/npu-vlink.

Log & Report

Bug ID

Description

1010244

When uploading the log file to the FTP server, some parts of the log files are not included in the upload.

Proxy

Bug ID

Description

910678

CPU usage issue in WAD caused by a high number of devices being detected by the device detection feature.

1060812

When Proxy-mode inline IPS scanning is enabled, the botnet check within the IPS profile does not work as expected when the IPS profile is applied to a proxy-based inspection policy using certificate inspection.

Workaround: disable ips.settings.proxy-inline-ips in the CLI.

Routing

Bug ID

Description

903444

The diagnose ip rtcache list command is no longer supported in the FortiOS 4.19 kernel.

Security Fabric

Bug ID

Description

948322

After deauthorizing a downstream FortiGate from the System > Firmware & Registration page, the page may appear to be stuck to loading.

Workaround: perform a full page refresh to allow the page to load again.

1011833

FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages.

1021684

In some cases, the Security Fabric topology does not load properly and displays a Failed to load Topology Results error.

System

Bug ID

Description

912383

FGR-70F and FGR-70F-3G4G failed to perform regular reboot process (using execute reboot command) with an SD card inserted.

983467

FortiGate 60F and 61F models may experience a memory usage issue during a FortiGuard update due to the ips-helper process. This can cause the FortiGate to go into conserve mode if there is not enough free memory.

Workaround: User can disable CP acceleration to reduce the memory usage.

config ips global
    set cp-accel-mode none
end

1015698

On FortiGate 601F models, the X5 - X8 interfaces with 25G SFP28 DAC are down after upgrading to version 7.4.4 or later.

1021903

After an interface role change, the updated role does not show in the le-switch member list.

1057131

A FortiGuard update can cause the system to not operate as expected if the FortiGate is already in conserve mode. Users may need to reboot the FortiGate.

Upgrade

Bug ID

Description

1027462

When restoring an FortiGate, the 7.4.1 config file with deprecated Inline CASB entries displays errors messages and causes the confsyncd to not function as expected.

1031574

During a graceful upgrade, the confsync daemon and updated daemon encounter a memory usage issue, causing a race condition.

User & Authentication

Bug ID

Description

667150

On the User & Authentication > User Definition page, when a remote LDAP user with Two-factor Authentication enabled and Authentication type FortiToken tries to access the internet through firewall authentication, the web page does not receive the FortiToken notification or proceed to authenticate the user.

Workaround: click the Continue button on the authentication page after approving the FortiToken on the mobile device.

884462

NTLM authentication does not work with Chrome.

972391

RADIUS group is not properly displayed as used.

1080234

For FortiGate (versions 7.2.10 and 7.4.5 and later) and FortiNAC (versions 9.2.8 and 9.4.6 and prior) integration, when testing connectivity/user credentials against FortiNAC that acts as a RADIUS server, the FortiGate GUI and CLI returns an invalid secret for the server error.

This error is expected when the FortiGate acts as the direct RADIUS client to the FortiNAC RADIUS server due to a change in how FortiGate handles RADIUS protocol in these versions. However, the end-to-end integration for the clients behind the FortiGate and FortiNAC is not impacted.

Workaround: confirm the connectivity between the end clients and FortiNAC by checking if the clients can still be authorized against the FortiNAC as normal.

VM

Bug ID

Description

978021

VNI length is zero in the GENEVE header when in FTP passive mode.

1082197

The FortiGate-VM on VMware ESXi equipped with an Intel E810-XXV network interface card (NIC) using SFP28 transceivers at 25G speed is unable to pass VLAN traffic when DPDK is enabled.

WiFi Controller

Bug ID

Description

814541

When there are extra large number of managed FortiAP devices (over 500) and large number of WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long time to load. This issue does not impact FortiAP operation.

869978

CAPWAP tunnel traffic over tunnel SSID is dropped when offloading is enabled.

903922

Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation.

964757

Clients randomly unable to connect to 802.1X SSID when FortiAP has a DTLS policy enabled.

972093

RADIUS accounting data usage is different between the bridge and tunnel VAP.

1050915

When upgrading more than 30 managed FortiAPs at the same time using the Managed FortiAP page, the GUI may become slow and unresponsive when selecting the firmware.

Workaround: Upgrade the FortiAPs in smaller batches of up to 20 devices to avoid performance impacts.

ZTNA

Bug ID

Description

819987

SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting.

1020084

Health check on the ZTNA realserver does not work as expected if a blackhole route is added to the realserver address.

Known issues

Known issues

Known issues are organized into the following categories:

To inquire about a particular bug or report a bug, please contact Customer Service & Support.

New known issues

The following issues have been identified in version 7.4.5.

FortiGate 6000 and 7000 platforms

Bug ID

Description

1016439

Enabling or disabling a vcluster causes some backup routes (proto = 20) to be lost when a routing table has a significant amount of routes (over 10000 routes).

1048808

If the secondary reboots, after it rejoins the cluster SIP sessions are not resynchronized.

1056894 On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1078532

When upgrading the FG6001F platform, in some instances the slave chassis does not synchronize the FPC subscription license from master chassis.

Workaround: use the execute update-now command.

GUI

Bug ID

Description

1071907

There is no setting for the type option on the GUI for npu_vlink interface.

HA

Bug ID

Description

1084335

Existing API key may not work as expected with a 403 error wrong vdom displaying after upgrading to FortiOS v7.4.5 version.

Workaround: Regenerate the API user key to resolve the permission error.

IPsec VPN

Bug ID

Description

1081951 FortiGate encounters a steadily increasing IKED memory usage issue after upgrading to version 7.4.5.

System

Bug ID

Description

1046484

After shutting down FortiGate, the system automatically boots up again.

1078541

The FortiFirewall 2600F model may become stuck after a fresh image burn. Upgrading from a previous version stills works.

Workaround: power cycle the unit.

VM

Bug ID

Description

1094274 FortiGate becomes unresponsive due to an error condition when sending IPv6 traffic.

Existing known issues

The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.4.5.

Explicit Proxy

Bug ID

Description

1026362

Web pages do not load when persistent-cookie is disabled for session-cookie-based authentication with captive-portal.

Firewall

Bug ID

Description

959065

On the Policy & Objects > Traffic Shaping page, when deleting or creating a shaper, the counters for the other shapers are cleared.

1007566

When the FortiGate has thousands of addresses and hundreds address groups, the GUI can take a few minutes to search for a specific address inside the address group dialog.

Workaround: User can create the address group in the CLI instead by using the exact address name. User can also perform a search in the CLI using a partial match. For example:

config firewall addrgrp
    edit address_group
        set member <pattern>?
    next
end

1057080

On the Firewall Policy page, search results do not display in an expanded format.

FortiGate 6000 and 7000 platforms

Bug ID

Description

790464

After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond.

911244

FortiGate 7000E IPv6 routes may not be synchronized correctly among FIMs and FPMs.

976521

On FortiGate 6000 models, a CPU usage issue occurs in the node process when navigating a policy list with a large number (+7000) of policies in a VDOM.

1006759

After an HA failover, there is no IPsec route in the kernel.

1018594

On FortiGate 7000, if gtp-mode is enabled and then disabled, after disabling gtp-enhanced mode and rebooting the device, traffic is disrupted on the FIM and cannot be recovered.

Workaround: downgrade to version 7.2.x or 7.4.3.

1026665

On the FortiGate 7000F platform with virtual clustering enabled and syslog logging configured, when running the diagnose log test command from a primary vcluster VDOM, some FPMs may not send log messages to the configured syslog servers.

1056894

On FortiGate, IPv6 VRF routing tables appear under the new and old FPC primary units when the primary FPC slot is changed.

1060619

CSF is not working as expected.

1070365

FGCP HA session synchronization may stop working as expected on a FortiGate 7000F cluster managed by FortiManager. This happens if the HA configuration uses management interfaces as session synchronization interfaces by configuring the session-sync-dev option, for example:

config system ha
    set session-sync-dev 1-M1 1-M2
end

The problem occurs when FortiManager updates the configuration of the FortiGate 7000F devices in the cluster it incorrectly changes to the VDOM of the management interfaces added to the session-sync-dev command from mgmt-vdom to vsys_ha and the interfaces stop working as session sync interfaces.

You can work around the problem by re-configuring the session-sync-dev option on the FortiGate 7000F cluster (this resets the VDOM of the session sync interfaces to vsys_ha) and then retrieving the FortiGate configuration from FortiManager. This synchronizes the correct configuration to FortiManager.

GUI

Bug ID

Description

853352

When viewing entries in slide-out window of the Policy & Objects > Internet Service Database page, users cannot scroll down to the end if there are over 100K entries.

885427

Suggest showing the SFP status information on the faceplate of FGR-60F/60F-3G4G devices.

HA

Bug ID

Description

1000808

FortiGate in an HA setup has an unnecessary primary unit selection when a new member joins or reboots one member in the VC cluster when the VC has more than 2 units.

1054041

On FortiGate's in an HA environment, DHCP clients can not connect to the DHCP server.

1084662

FFDB signatures keep flapping on all blades except the master FIM of the primary chassis.

Hyperscale

Bug ID

Description

817562

NPD/LPMD cannot differentiate the different VRFs, and considers all VRFs as 0.

896203

The parse error, NPD-0:NPD PARSE ADDR GRP gmail.com MEMBER ERR, appears after rebooting the system.

961328

FortiGate does not choose a random port when set to random mode.

977376

FG-4201F has a 10% performance drop during a CPS test case with DoS policy.

1024274

When Hyperscale logging is enabled with multicast log, the log is not sent to servers that are configured to receive multicast logs.

1024902

After FTP traffic passes, the npu-session stat does not display the accurate amount of actual sessions on FortiGate.

1025908

When running FGSP setup, the session count is approximately 50% less on the peer device.

IPsec VPN

Bug ID

Description

866413

Traffic over GRE tunnel over IPsec tunnel, or traffic over IPsec tunnel with GRE encapsulation is not offloaded on NP7-based units.

897871

GRE over IPsec does not work in transport mode.

944600

CPU usage issues occurred when IPsec VPN traffic was received on the VLAN interface of an NP7 vlink.

970703

FortiGate 6K and 7K models do not support IPsec VPN over vdom-link/npu-vlink.

Log & Report

Bug ID

Description

1010244

When uploading the log file to the FTP server, some parts of the log files are not included in the upload.

Proxy

Bug ID

Description

910678

CPU usage issue in WAD caused by a high number of devices being detected by the device detection feature.

1060812

When Proxy-mode inline IPS scanning is enabled, the botnet check within the IPS profile does not work as expected when the IPS profile is applied to a proxy-based inspection policy using certificate inspection.

Workaround: disable ips.settings.proxy-inline-ips in the CLI.

Routing

Bug ID

Description

903444

The diagnose ip rtcache list command is no longer supported in the FortiOS 4.19 kernel.

Security Fabric

Bug ID

Description

948322

After deauthorizing a downstream FortiGate from the System > Firmware & Registration page, the page may appear to be stuck to loading.

Workaround: perform a full page refresh to allow the page to load again.

1011833

FortiGate experiences a CPU usage issue in the node process when there multiple administrator sessions running simultaneously on the GUI in a Security Fabric with multiple downstream devices. This may result in slow loading times for multiple GUI pages.

1021684

In some cases, the Security Fabric topology does not load properly and displays a Failed to load Topology Results error.

System

Bug ID

Description

912383

FGR-70F and FGR-70F-3G4G failed to perform regular reboot process (using execute reboot command) with an SD card inserted.

983467

FortiGate 60F and 61F models may experience a memory usage issue during a FortiGuard update due to the ips-helper process. This can cause the FortiGate to go into conserve mode if there is not enough free memory.

Workaround: User can disable CP acceleration to reduce the memory usage.

config ips global
    set cp-accel-mode none
end

1015698

On FortiGate 601F models, the X5 - X8 interfaces with 25G SFP28 DAC are down after upgrading to version 7.4.4 or later.

1021903

After an interface role change, the updated role does not show in the le-switch member list.

1057131

A FortiGuard update can cause the system to not operate as expected if the FortiGate is already in conserve mode. Users may need to reboot the FortiGate.

Upgrade

Bug ID

Description

1027462

When restoring an FortiGate, the 7.4.1 config file with deprecated Inline CASB entries displays errors messages and causes the confsyncd to not function as expected.

1031574

During a graceful upgrade, the confsync daemon and updated daemon encounter a memory usage issue, causing a race condition.

User & Authentication

Bug ID

Description

667150

On the User & Authentication > User Definition page, when a remote LDAP user with Two-factor Authentication enabled and Authentication type FortiToken tries to access the internet through firewall authentication, the web page does not receive the FortiToken notification or proceed to authenticate the user.

Workaround: click the Continue button on the authentication page after approving the FortiToken on the mobile device.

884462

NTLM authentication does not work with Chrome.

972391

RADIUS group is not properly displayed as used.

1080234

For FortiGate (versions 7.2.10 and 7.4.5 and later) and FortiNAC (versions 9.2.8 and 9.4.6 and prior) integration, when testing connectivity/user credentials against FortiNAC that acts as a RADIUS server, the FortiGate GUI and CLI returns an invalid secret for the server error.

This error is expected when the FortiGate acts as the direct RADIUS client to the FortiNAC RADIUS server due to a change in how FortiGate handles RADIUS protocol in these versions. However, the end-to-end integration for the clients behind the FortiGate and FortiNAC is not impacted.

Workaround: confirm the connectivity between the end clients and FortiNAC by checking if the clients can still be authorized against the FortiNAC as normal.

VM

Bug ID

Description

978021

VNI length is zero in the GENEVE header when in FTP passive mode.

1082197

The FortiGate-VM on VMware ESXi equipped with an Intel E810-XXV network interface card (NIC) using SFP28 transceivers at 25G speed is unable to pass VLAN traffic when DPDK is enabled.

WiFi Controller

Bug ID

Description

814541

When there are extra large number of managed FortiAP devices (over 500) and large number of WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long time to load. This issue does not impact FortiAP operation.

869978

CAPWAP tunnel traffic over tunnel SSID is dropped when offloading is enabled.

903922

Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation.

964757

Clients randomly unable to connect to 802.1X SSID when FortiAP has a DTLS policy enabled.

972093

RADIUS accounting data usage is different between the bridge and tunnel VAP.

1050915

When upgrading more than 30 managed FortiAPs at the same time using the Managed FortiAP page, the GUI may become slow and unresponsive when selecting the firmware.

Workaround: Upgrade the FortiAPs in smaller batches of up to 20 devices to avoid performance impacts.

ZTNA

Bug ID

Description

819987

SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting.

1020084

Health check on the ZTNA realserver does not work as expected if a blackhole route is added to the realserver address.