Fortinet black logo

Resolved issues

Resolved issues

The following issues have been fixed in Hyperscale firewall for FortiOS 7.2.4 Build 1396. For inquires about a particular bug, please contact Customer Service & Support. The Resolved issues described in the FortiOS 7.2.4 release notes also apply to Hyperscale firewall for FortiOS 7.2.4 Build 1396.

Bug ID

Description

724085

NP7 processors no longer support offloading sessions that will pass through two EMAC-VLAN interfaces. This includes traffic passing through an EMAC-VLAN interface when the parent interface is in another VDOM. This means that traffic will no longer be blocked when it passes through two EMAC-VLAN interfaces with offloading enabled. Instead, the traffic will be processed by the CPU and will not be offloaded to NP7 processors.

775793

You can use the following command to record traffic shaper statistics for sessions offloaded to NP7 processors:

config system npu

set shaping-stats {disable | enable}

end

With this option enabled, FortiOS records traffic shaping statistics for sessions offloaded to NP7 processors in the same way as sessions that are processed by the CPU.

To record traffic shaping statistics for offloaded NP7 sessions, the NP7 processors must be operating in policing traffic shaping mode.

777924

You can use the following command to protect a FortiGate with NP7 processors from non-SYN TCP attacks:

configure system npu

set ple-non-syn-tcp-action {drop | forward}

end

By default this option is set to forward, and the NP7 policy lookup engine (PLE) sends TCP local-in non-SYN packets that are from TCP sessions that haven't been established to the CPU. If your FortiGate performance is affected by large numbers of local-in non-SYN packets, you can set this option to drop, causing the NP7 PLE to drop TCP local-in non-SYN packets.

780315

Resolved an issue that reduces connections per second (CPS) performance for VLAN traffic.

804742 810366 Resolved a memory-related issue that caused it to take longer than expected for hyperscale firewall policy changes to be applied to traffic. The delay affected offloaded NP7 traffic and CPU traffic
805179 Resolved an issue that blocked traffic that could be offloaded to NP7 processors when that traffic passes through a VXLAN interface that is part of a software switch.
807476

Packet buffers are now successfully cleaned up after going through host interface TX/RX queues.

809030 Resolved an issue that could sometimes cause traffic accepted by hyperscale firewall policies with port block allocation (PBA) IP pools to be dropped. The problem could occur after changing the hyperscale firewall policy configuration.
809623 Resolved an issue that caused CAPWAP traffic to be dropped when CAPWAP offloading is enabled for FortiGates with NP7 processors.

813314

Resolved an issue with how the GUI and CLI displays information about single port allocation CGN IP pools.

815253 825523 Resolved an issue that could sometimes randomly block traffic in NP7-offloaded IPsec VPN tunnels. The problem would happen more often as the number of IPsec VPN tunnels increased.

815360

Resolved an issue that could cause FortiGates with NP7 processors to encounter a kernel panic when deleting more than two hardware switches at the same time.

816385

Resolved an issue that could cause FortiGates with NP7 processors to display a message similar to rcu_sched self-detected stall on CPU on console and freeze. This would occur after enabling NP7 capwap-offload or sending inner VLAN traffic and restarting FortiOS or upgrading the firmware.

819872

Resolved an issue affecting FortiGates with NP7 processors in an FGCP HA cluster that could cause a kernel panic and lost heartbeat packets. The issue could also result in an HA split brain scenario after a firmware upgrade.

821320

Resolved an issue that caused NP7 processors to drop L2 tunneled VLAN wireless client traffic when CAPWAP offloading is enabled.

824733 Resolved a routing synchronization issue that sometimes caused IPv6 static routes to continue to be active in VDOMs after they have been deleted from the configuration.

826719

Resolved an issue that caused incorrect hardware session counts to be displayed on the GUI or CLI after deleting multicast sessions.

831672 835697 836443

Interface routes are now successfully deleted from the NP7 LPM routing table after moving an interface to a different VDOM. This change also resolves an issue with DHCP servers on interfaces in hyperscale firewall VDOMs

834762 836049

Resolved an issue that could cause a kernel panic on FortiGates with NP7 processors in an FGCP HA cluster.

836474

Changing the zone configuration of a hyperscale firewall VDOM is now supported by the hyperscale firewall policy engine.

836687 837682

Improved the accuracy of statistics collected from hardware logging.

837270 857311

Allowing intra-zone traffic is now supported in hyperscale firewall VDOMs. Options to block or allow intra-zone traffic are available on the GUI and CLI.

843305

A message similar to PARSE SKIP ERROR=17 NPD ERR PBR ADDRESS no longer appears on the console error log when a FortiGate with NP7 processors starts up.

848938

Resolved an issue that could cause the Session Search Engine (SSE) running on an NP7 processor on the primary FortiGate in an FGCP cluster to stop working after received an HASYNC message from the secondary FortiGate.

856264 859171

Resolved an issue with how NP7 processors process large packets or fragmented packets in hairpin traffic.

861442

Unsupported ZTNA options removed from hyperscale firewall policies.

863520

Resolved an issue that could cause incorrect session counts for NP7 sessions passing through non-hyperscale VDOMs of a FortiGate with hyperscale features enabled.

864495

Resolved an issue that caused the GUI to display incorrect resource statistics for CGN resource allocation IP pool groups.

Resolved issues

The following issues have been fixed in Hyperscale firewall for FortiOS 7.2.4 Build 1396. For inquires about a particular bug, please contact Customer Service & Support. The Resolved issues described in the FortiOS 7.2.4 release notes also apply to Hyperscale firewall for FortiOS 7.2.4 Build 1396.

Bug ID

Description

724085

NP7 processors no longer support offloading sessions that will pass through two EMAC-VLAN interfaces. This includes traffic passing through an EMAC-VLAN interface when the parent interface is in another VDOM. This means that traffic will no longer be blocked when it passes through two EMAC-VLAN interfaces with offloading enabled. Instead, the traffic will be processed by the CPU and will not be offloaded to NP7 processors.

775793

You can use the following command to record traffic shaper statistics for sessions offloaded to NP7 processors:

config system npu

set shaping-stats {disable | enable}

end

With this option enabled, FortiOS records traffic shaping statistics for sessions offloaded to NP7 processors in the same way as sessions that are processed by the CPU.

To record traffic shaping statistics for offloaded NP7 sessions, the NP7 processors must be operating in policing traffic shaping mode.

777924

You can use the following command to protect a FortiGate with NP7 processors from non-SYN TCP attacks:

configure system npu

set ple-non-syn-tcp-action {drop | forward}

end

By default this option is set to forward, and the NP7 policy lookup engine (PLE) sends TCP local-in non-SYN packets that are from TCP sessions that haven't been established to the CPU. If your FortiGate performance is affected by large numbers of local-in non-SYN packets, you can set this option to drop, causing the NP7 PLE to drop TCP local-in non-SYN packets.

780315

Resolved an issue that reduces connections per second (CPS) performance for VLAN traffic.

804742 810366 Resolved a memory-related issue that caused it to take longer than expected for hyperscale firewall policy changes to be applied to traffic. The delay affected offloaded NP7 traffic and CPU traffic
805179 Resolved an issue that blocked traffic that could be offloaded to NP7 processors when that traffic passes through a VXLAN interface that is part of a software switch.
807476

Packet buffers are now successfully cleaned up after going through host interface TX/RX queues.

809030 Resolved an issue that could sometimes cause traffic accepted by hyperscale firewall policies with port block allocation (PBA) IP pools to be dropped. The problem could occur after changing the hyperscale firewall policy configuration.
809623 Resolved an issue that caused CAPWAP traffic to be dropped when CAPWAP offloading is enabled for FortiGates with NP7 processors.

813314

Resolved an issue with how the GUI and CLI displays information about single port allocation CGN IP pools.

815253 825523 Resolved an issue that could sometimes randomly block traffic in NP7-offloaded IPsec VPN tunnels. The problem would happen more often as the number of IPsec VPN tunnels increased.

815360

Resolved an issue that could cause FortiGates with NP7 processors to encounter a kernel panic when deleting more than two hardware switches at the same time.

816385

Resolved an issue that could cause FortiGates with NP7 processors to display a message similar to rcu_sched self-detected stall on CPU on console and freeze. This would occur after enabling NP7 capwap-offload or sending inner VLAN traffic and restarting FortiOS or upgrading the firmware.

819872

Resolved an issue affecting FortiGates with NP7 processors in an FGCP HA cluster that could cause a kernel panic and lost heartbeat packets. The issue could also result in an HA split brain scenario after a firmware upgrade.

821320

Resolved an issue that caused NP7 processors to drop L2 tunneled VLAN wireless client traffic when CAPWAP offloading is enabled.

824733 Resolved a routing synchronization issue that sometimes caused IPv6 static routes to continue to be active in VDOMs after they have been deleted from the configuration.

826719

Resolved an issue that caused incorrect hardware session counts to be displayed on the GUI or CLI after deleting multicast sessions.

831672 835697 836443

Interface routes are now successfully deleted from the NP7 LPM routing table after moving an interface to a different VDOM. This change also resolves an issue with DHCP servers on interfaces in hyperscale firewall VDOMs

834762 836049

Resolved an issue that could cause a kernel panic on FortiGates with NP7 processors in an FGCP HA cluster.

836474

Changing the zone configuration of a hyperscale firewall VDOM is now supported by the hyperscale firewall policy engine.

836687 837682

Improved the accuracy of statistics collected from hardware logging.

837270 857311

Allowing intra-zone traffic is now supported in hyperscale firewall VDOMs. Options to block or allow intra-zone traffic are available on the GUI and CLI.

843305

A message similar to PARSE SKIP ERROR=17 NPD ERR PBR ADDRESS no longer appears on the console error log when a FortiGate with NP7 processors starts up.

848938

Resolved an issue that could cause the Session Search Engine (SSE) running on an NP7 processor on the primary FortiGate in an FGCP cluster to stop working after received an HASYNC message from the secondary FortiGate.

856264 859171

Resolved an issue with how NP7 processors process large packets or fragmented packets in hairpin traffic.

861442

Unsupported ZTNA options removed from hyperscale firewall policies.

863520

Resolved an issue that could cause incorrect session counts for NP7 sessions passing through non-hyperscale VDOMs of a FortiGate with hyperscale features enabled.

864495

Resolved an issue that caused the GUI to display incorrect resource statistics for CGN resource allocation IP pool groups.