Resolved issues
The following issues have been resolved in FortiADC 7.6.4 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.
|
Bug ID |
Description |
|---|---|
| 1194018 | External applications were slow after upgrade due to packet drops on LRO/GRO traffic caused by an incorrect TSO check. |
| 1192054 | Maximum Request Header Value Length limit increased to 16,384. |
| 1191529 | Editing a virtual server in AP mode failed with a “traffic group conflict” error because traffic group validation was incorrectly applied outside HA VRRP mode. |
| 1190857 | Virtual servers experienced timeouts and connection failures due to reverse routing lookups failing after fast forwarding entries expired. |
| 1190637 | Expired ACME certificates caused SSL errors and prevented proper SNI matching due to TLS-ALPN renewal failure, disrupting other certificates in the same certificate group. |
| 1187948 | Certificate configurations were lost after upgrade from 7.4.5 to 7.4.7 because private key passwords containing unescaped double quotes or backslashes caused configuration errors in CMDB. |
|
1184789 |
FortiSandbox Cloud activation failed through a proxy with “FortiCloud internal error” due to an SSL read timing issue when responses were not received in time. |
| 1184197 | FortiADC licensed through FortiFlex remained restricted to VM01 limits despite valid VM08 entitlement due to incorrect CMDB tablesize handling after CPU allocation. |