Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been resolved in FortiADC 8.0.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

1205106 In the GUI, the Add Filter option under Network Security > Firewall was incorrectly grayed out and unavailable.
1200598 When HTTPS service was enabled on port2 and port3 in an Active-Active HA cluster, a node could drop out of the cluster due to a GLB process binding failure during HA synchronization. The issue caused temporary cluster instability until the node rejoined.
1194018 After upgrading to version 7.4.8, external connections could experience performance degradation due to dropped packets on the ingress ADC. The issue was caused by an incorrect check in the LRO/GRO handling logic that required TSO to be enabled, resulting in packet drops when receiving large packets assembled by LRO/GRO.
1192054 Maximum Request Header Value Length limit increased to 16,384.
1191529 Editing a virtual server in AP mode failed with a “traffic group conflict” error because traffic group validation was incorrectly applied outside HA VRRP mode.
1190857 Virtual servers experienced timeouts and connection failures due to reverse routing lookups failing after fast forwarding entries expired.
1187948 Certificate configurations were lost after upgrade from 7.4.5 to 7.4.7 because private key passwords containing unescaped double quotes or backslashes caused configuration errors in CMDB.
1184789 FortiSandbox Cloud activation failed through a proxy with “FortiCloud internal error” due to an SSL read timing issue when responses were not received in time.
1184197 FortiADC licensed through FortiFlex remained restricted to VM01 limits despite valid VM08 entitlement due to incorrect CMDB tablesize handling after CPU allocation.
1178580 In Kubernetes environments using the FortiADC Ingress Controller, the SLB virtual server configuration in the GUI displayed an incorrect real server pool reference. When content routing was enabled, the associated real server pool field should have been hidden or disabled, as routing decisions were determined by content rules. The CLI configuration was unaffected.
1168921 After upgrading to firmware version 7.6.2, IPv6 routes are missing and the default route becomes inactive due to delayed initialization of rtmd, which fails to load global address information during startup.
1168495 The system incorrectly counted SMTP (secure) and Diameter (SSL) services toward the hardware SSL instance limit. The limitation now correctly applies only to HTTPS and TCPS virtual servers.
1165214 In AAG authentication, passwords containing special characters were incorrectly URL-encoded, causing login failures for both local and remote user accounts. The issue has been corrected so that special characters are now processed properly. The characters \, ', and " remain unsupported, consistent with non-AAG local user password limitations.
1163215 DNS zone transfers fail through FortiADC when the zone file is large, as the system sends a TCP RST to the backend after partial transfer (~25,000 records), due to an insufficient backend receive buffer size.
1160460 SCEP certificate retrieval fails when the server returns a full certificate chain containing multiple certificates.
1153978 The FortiView real server pool statistics page did not display or allow selection of a time span for the traffic graph, unlike other FortiView views.
1150240 FortiADC (secondary) enters a reboot loop when connected to the network with the heartbeat interface active, triggered by a buffer overflow caused by an excessively long certificate file name.

Resolved issues

Resolved issues

The following issues have been resolved in FortiADC 8.0.1 release. For inquiries about particular bugs, please contact Fortinet Customer Service & Support.

Bug ID

Description

1205106 In the GUI, the Add Filter option under Network Security > Firewall was incorrectly grayed out and unavailable.
1200598 When HTTPS service was enabled on port2 and port3 in an Active-Active HA cluster, a node could drop out of the cluster due to a GLB process binding failure during HA synchronization. The issue caused temporary cluster instability until the node rejoined.
1194018 After upgrading to version 7.4.8, external connections could experience performance degradation due to dropped packets on the ingress ADC. The issue was caused by an incorrect check in the LRO/GRO handling logic that required TSO to be enabled, resulting in packet drops when receiving large packets assembled by LRO/GRO.
1192054 Maximum Request Header Value Length limit increased to 16,384.
1191529 Editing a virtual server in AP mode failed with a “traffic group conflict” error because traffic group validation was incorrectly applied outside HA VRRP mode.
1190857 Virtual servers experienced timeouts and connection failures due to reverse routing lookups failing after fast forwarding entries expired.
1187948 Certificate configurations were lost after upgrade from 7.4.5 to 7.4.7 because private key passwords containing unescaped double quotes or backslashes caused configuration errors in CMDB.
1184789 FortiSandbox Cloud activation failed through a proxy with “FortiCloud internal error” due to an SSL read timing issue when responses were not received in time.
1184197 FortiADC licensed through FortiFlex remained restricted to VM01 limits despite valid VM08 entitlement due to incorrect CMDB tablesize handling after CPU allocation.
1178580 In Kubernetes environments using the FortiADC Ingress Controller, the SLB virtual server configuration in the GUI displayed an incorrect real server pool reference. When content routing was enabled, the associated real server pool field should have been hidden or disabled, as routing decisions were determined by content rules. The CLI configuration was unaffected.
1168921 After upgrading to firmware version 7.6.2, IPv6 routes are missing and the default route becomes inactive due to delayed initialization of rtmd, which fails to load global address information during startup.
1168495 The system incorrectly counted SMTP (secure) and Diameter (SSL) services toward the hardware SSL instance limit. The limitation now correctly applies only to HTTPS and TCPS virtual servers.
1165214 In AAG authentication, passwords containing special characters were incorrectly URL-encoded, causing login failures for both local and remote user accounts. The issue has been corrected so that special characters are now processed properly. The characters \, ', and " remain unsupported, consistent with non-AAG local user password limitations.
1163215 DNS zone transfers fail through FortiADC when the zone file is large, as the system sends a TCP RST to the backend after partial transfer (~25,000 records), due to an insufficient backend receive buffer size.
1160460 SCEP certificate retrieval fails when the server returns a full certificate chain containing multiple certificates.
1153978 The FortiView real server pool statistics page did not display or allow selection of a time span for the traffic graph, unlike other FortiView views.
1150240 FortiADC (secondary) enters a reboot loop when connected to the network with the heartbeat interface active, triggered by a buffer overflow caused by an excessively long certificate file name.