Fortinet black logo

Known issues

Known issues

This section lists the known issues of this release, but is not a complete list. For inquires about a particular bug, please visit the Fortinet Support website.

Bug ID

Description

566145

Usage Profile TIME USAGE=Time used is not triggering COA or disconnect request to FortiGate.

576931

Admin logout GUI glitch.

603105

LDAP user import uses server IP from DB despite browser using/showing unsaved one.

619259

'Export key and Certificate' option should be grayed out for an intermediate CA whose root uses HSM.

620127

Changing from maint-mode-no-sync to maint-mode-sync does not appear to restore syncing.

637028

SSL connection failed in case of an expired certificate issue is not explicit enough.

643810

restore-admin CLI command needs improvement.

680776

AP HA secondary cannot change the mgmt interface access configuration, and the option does not sync from primary either.

741765

REST API /api/v1/tacpluspolicyclient/ endpoint does not recognize policy_name or client_name parameters.

743775

SCEP Get CA requests intermittently fail under high SCEP load.

751108

FortiAuthenticator does not support admin OIDs from FORTINET-CORE-MIB properly.

756414

Incorrect Italian translation of Next button displayed on the reset password page.

766453

Check the reason for FortiAuthenticator 400E auto reboot.

775026

Sponsor is able to edit static routing settings.

776247

Importing guest users via CSV does not add them to newly created user groups.

781832

Token bypass not working for FIDO enabled self-service portal,

787855

Single sign-on for one FortiAuthenticator as password and another as OTP not working as intended.

801933

FortiAuthenticator as LDAP server; logs shows LDAP_FAC in the Source IP field.

805969

FortiAuthenticator supports Zero Trust tunnels to multiple remote LDAP servers through one FortiGate only.

808748

Self-service portal password change fails for remote LDAP users if UPN format is used.

814255

Custom RADIUS attributes disappear on HA secondary after failover and we get 500 crash when clicking into RADIUS policy.

835267

Narrowing the browser window causes GUI elements to overlap.

835564

Narrow browser size to the smallest window size will cause all UI element to overlap display.

837728

Local services cannot use cert with >97 character subject length.

837791

TACACS+ authentication fails when the authentication process takes long.

838850

Portal Policy on the Firefox web browser boxes not aligned properly.

838976

Windows log events in FSSO are dropping after some time.

841996

Back button in the user lookup page does not navigate back to the original user list page.

842886

Upgrading FortiAuthenticator in HA-LB removes the MAC-address records form the LB node.

843334

KVM model does not obey hypervisor soft restart/shutdown commands.

847399

Resizing the window causes GUI fields to overlap in Logs page.

848434

Usability of User Group GUI.

850023

HA Cluster not forming due to differing smartconnect primary key name (upgrade path mismatch, but should work).

850906

If the user has only an email token for it's second factor authentication, and the portal has Allow users to temporarily use email token authentication if an email was pre-configured enabled under Fortitoken Revocation, the user should not be able to use Switch to email token authentication.

854050

t takes a long time for FortiAuthenticator to reflect active certificates in the GUI after successful SCEP enrollment request.

857399

FortiAuthenticator fails to send out COA disconnect to FortiGate.

858383

NTLM authentication failure under load.

861027

RADIUS attribute name should be only unique within the dictionary, not across all dictionaries.

861112

NTLM authentication does not work with child domain.

861557

FortiAuthenticator remote user sync rules - Set Group Filter not working if OU has special characters in name, e.g., ( , ) , +.

861611

Smart Connect for Android running on version 12 and 13 never installed the configuration profile.

862394

In FortiAuthenticator CLI, a user can change DNS addresses even if we assign No-Access/Read-only admin profile.

863635

FIDO users status bug on SAML.

864201

Updating the image variable in SAML IdP replacement HTML editor could trigger 500 error.

865372

FortiNAC can overwhelm FortiAuthenticator with many TACACS+ logins on the same service account.

866392

FortiAuthenticator GUI/captive portal access freezes/become unresponsive during peak hours.

866686

JavaScript error when using the filter button on local users page.

866700

Sign in as a different user does not work on a proxy setup in SAML.

867289

FortiAuthenticator drops FSSO events with work queue full, dropping logon error.

868659

Change Western Sahara to Morocco (Southern Provinces) in the phone number country code.

868810

FortiAuthenticator HA device with low priority stays primary.

868829

IP lockout not being logged in on FortiAuthenticator logs.

869768

Unable to delete a user group.

870097

Machine authentication cache expiry.

872573

Enable CSP on user pages.

872920

Portal policy realms table values are in the wrong column.

873050

403 Forbidden error while doing SAML authentication after OAuth succeeds.

874256

Failed FIDO token authentication and reauthentication FIDO token using SP SAML portal causes error occurred.

874285

Unable to use FortiAuthenticator images in System replacement messages.

874293

FortiAuthenticator picks the incorrect IP from proxied requests from the header when multiple headers are used in a request.

876009

FortiAuthenticator ignores the groups filtering rules and sends all SSO groups to FortiGate if the FortiGate is configured with FQDN.

877745

Javascript errors being thrown by all(?) search filters.

877815

SAML IdP's IAM button should not be displayed if the SAML IdP portal is disabled.

877819

JavaScript error when enabling SSO on legacy self service portal.

878665

500 error when launching a Smart Connect profile that contains a CSR for Android.

878673

Certificate GUI filter by status times out when there are thousands of revoked certificates.

878828

After a reboot, FortiAuthenticator shows 500 Internal Server Error when synchronizing hardware tokens.

878854

Some users fail to authenticate through SSL VPN.

879091

Upgrade from 6.3.3 to 6.5.0 gives error in wad-service logs.

879570

Select All checkbox for Remote user sync rule does not select all the rules in Firefox without private window.

879613

HA boots into unstable state when cluster peer is not found.

881135

Javascript error when changing FortiAuthenticator GUI log history period.

881296

SNMP v3 with non-ENG letter pass gives authentication failed.

882098

FortiAuthenticator HA is out of sync and web server crashes when clicking on Packet Capture with 500 Internal server error.

882489

Error in logs for FTM authentication with mschapv2.

884299

HA Load balancer node is not synchronizing.

884316

SAML IdP Login Success Page: last login information not shown when the previous IdP session was cleared.

884713

500 error when accessing SAML IdP with http.

884902

Unable to import 10k plus groups from Azure via SAML in FortiAuthenticator.

887081

SAML: Launching SP-initiated SAML session for a user with FIDO AUTH produces server errors.

887135

Admin password recheck popup should have a Cancel button.

887645

Content security policy errors when trying to create new FTMs.

887938

Read-only profile page does not show the correct information.

889196

SAML sync rule groups input should be disabled when no server is selected.

889706

FortiAuthenticator Remote user sync rules - Test filter not working if OU has special characters in name, e.g., ( , ) , +.

890725

SAML token-only login displays password page instead of the token page.

890922

Login page not found after successful user registration.

899505

Unable to provision FortiToken Mobiles on FortiAuthenticator 200E/400E/3000E in 6.5.0/6.5.1.

900916

WAD-enforced administrator/service access rules are only applied to the first four interfaces. The rest is still handled in Python.

900550

2FA codes via SMS is not working.

Known issues

This section lists the known issues of this release, but is not a complete list. For inquires about a particular bug, please visit the Fortinet Support website.

Bug ID

Description

566145

Usage Profile TIME USAGE=Time used is not triggering COA or disconnect request to FortiGate.

576931

Admin logout GUI glitch.

603105

LDAP user import uses server IP from DB despite browser using/showing unsaved one.

619259

'Export key and Certificate' option should be grayed out for an intermediate CA whose root uses HSM.

620127

Changing from maint-mode-no-sync to maint-mode-sync does not appear to restore syncing.

637028

SSL connection failed in case of an expired certificate issue is not explicit enough.

643810

restore-admin CLI command needs improvement.

680776

AP HA secondary cannot change the mgmt interface access configuration, and the option does not sync from primary either.

741765

REST API /api/v1/tacpluspolicyclient/ endpoint does not recognize policy_name or client_name parameters.

743775

SCEP Get CA requests intermittently fail under high SCEP load.

751108

FortiAuthenticator does not support admin OIDs from FORTINET-CORE-MIB properly.

756414

Incorrect Italian translation of Next button displayed on the reset password page.

766453

Check the reason for FortiAuthenticator 400E auto reboot.

775026

Sponsor is able to edit static routing settings.

776247

Importing guest users via CSV does not add them to newly created user groups.

781832

Token bypass not working for FIDO enabled self-service portal,

787855

Single sign-on for one FortiAuthenticator as password and another as OTP not working as intended.

801933

FortiAuthenticator as LDAP server; logs shows LDAP_FAC in the Source IP field.

805969

FortiAuthenticator supports Zero Trust tunnels to multiple remote LDAP servers through one FortiGate only.

808748

Self-service portal password change fails for remote LDAP users if UPN format is used.

814255

Custom RADIUS attributes disappear on HA secondary after failover and we get 500 crash when clicking into RADIUS policy.

835267

Narrowing the browser window causes GUI elements to overlap.

835564

Narrow browser size to the smallest window size will cause all UI element to overlap display.

837728

Local services cannot use cert with >97 character subject length.

837791

TACACS+ authentication fails when the authentication process takes long.

838850

Portal Policy on the Firefox web browser boxes not aligned properly.

838976

Windows log events in FSSO are dropping after some time.

841996

Back button in the user lookup page does not navigate back to the original user list page.

842886

Upgrading FortiAuthenticator in HA-LB removes the MAC-address records form the LB node.

843334

KVM model does not obey hypervisor soft restart/shutdown commands.

847399

Resizing the window causes GUI fields to overlap in Logs page.

848434

Usability of User Group GUI.

850023

HA Cluster not forming due to differing smartconnect primary key name (upgrade path mismatch, but should work).

850906

If the user has only an email token for it's second factor authentication, and the portal has Allow users to temporarily use email token authentication if an email was pre-configured enabled under Fortitoken Revocation, the user should not be able to use Switch to email token authentication.

854050

t takes a long time for FortiAuthenticator to reflect active certificates in the GUI after successful SCEP enrollment request.

857399

FortiAuthenticator fails to send out COA disconnect to FortiGate.

858383

NTLM authentication failure under load.

861027

RADIUS attribute name should be only unique within the dictionary, not across all dictionaries.

861112

NTLM authentication does not work with child domain.

861557

FortiAuthenticator remote user sync rules - Set Group Filter not working if OU has special characters in name, e.g., ( , ) , +.

861611

Smart Connect for Android running on version 12 and 13 never installed the configuration profile.

862394

In FortiAuthenticator CLI, a user can change DNS addresses even if we assign No-Access/Read-only admin profile.

863635

FIDO users status bug on SAML.

864201

Updating the image variable in SAML IdP replacement HTML editor could trigger 500 error.

865372

FortiNAC can overwhelm FortiAuthenticator with many TACACS+ logins on the same service account.

866392

FortiAuthenticator GUI/captive portal access freezes/become unresponsive during peak hours.

866686

JavaScript error when using the filter button on local users page.

866700

Sign in as a different user does not work on a proxy setup in SAML.

867289

FortiAuthenticator drops FSSO events with work queue full, dropping logon error.

868659

Change Western Sahara to Morocco (Southern Provinces) in the phone number country code.

868810

FortiAuthenticator HA device with low priority stays primary.

868829

IP lockout not being logged in on FortiAuthenticator logs.

869768

Unable to delete a user group.

870097

Machine authentication cache expiry.

872573

Enable CSP on user pages.

872920

Portal policy realms table values are in the wrong column.

873050

403 Forbidden error while doing SAML authentication after OAuth succeeds.

874256

Failed FIDO token authentication and reauthentication FIDO token using SP SAML portal causes error occurred.

874285

Unable to use FortiAuthenticator images in System replacement messages.

874293

FortiAuthenticator picks the incorrect IP from proxied requests from the header when multiple headers are used in a request.

876009

FortiAuthenticator ignores the groups filtering rules and sends all SSO groups to FortiGate if the FortiGate is configured with FQDN.

877745

Javascript errors being thrown by all(?) search filters.

877815

SAML IdP's IAM button should not be displayed if the SAML IdP portal is disabled.

877819

JavaScript error when enabling SSO on legacy self service portal.

878665

500 error when launching a Smart Connect profile that contains a CSR for Android.

878673

Certificate GUI filter by status times out when there are thousands of revoked certificates.

878828

After a reboot, FortiAuthenticator shows 500 Internal Server Error when synchronizing hardware tokens.

878854

Some users fail to authenticate through SSL VPN.

879091

Upgrade from 6.3.3 to 6.5.0 gives error in wad-service logs.

879570

Select All checkbox for Remote user sync rule does not select all the rules in Firefox without private window.

879613

HA boots into unstable state when cluster peer is not found.

881135

Javascript error when changing FortiAuthenticator GUI log history period.

881296

SNMP v3 with non-ENG letter pass gives authentication failed.

882098

FortiAuthenticator HA is out of sync and web server crashes when clicking on Packet Capture with 500 Internal server error.

882489

Error in logs for FTM authentication with mschapv2.

884299

HA Load balancer node is not synchronizing.

884316

SAML IdP Login Success Page: last login information not shown when the previous IdP session was cleared.

884713

500 error when accessing SAML IdP with http.

884902

Unable to import 10k plus groups from Azure via SAML in FortiAuthenticator.

887081

SAML: Launching SP-initiated SAML session for a user with FIDO AUTH produces server errors.

887135

Admin password recheck popup should have a Cancel button.

887645

Content security policy errors when trying to create new FTMs.

887938

Read-only profile page does not show the correct information.

889196

SAML sync rule groups input should be disabled when no server is selected.

889706

FortiAuthenticator Remote user sync rules - Test filter not working if OU has special characters in name, e.g., ( , ) , +.

890725

SAML token-only login displays password page instead of the token page.

890922

Login page not found after successful user registration.

899505

Unable to provision FortiToken Mobiles on FortiAuthenticator 200E/400E/3000E in 6.5.0/6.5.1.

900916

WAD-enforced administrator/service access rules are only applied to the first four interfaces. The rest is still handled in Python.

900550

2FA codes via SMS is not working.