Fortinet white logo
Fortinet white logo

Resolved issues

Resolved issues

The following issues have been fixed in version 6.2.2. For inquires about a particular bug, please contact Customer Service & Support.

New features or enhancements

Bug ID

Description

379089

Enable CPU hot plug-in kernel configuration with execute cpu show and execute cpu add.

437116

For DFS-approved countries, add 160 MHz Channel Bonding support for FortiAP U421EV, U422EV, and U423EV models (edit [FAPU421EV-default | FAPU422EV-default | FAPU423EV-default]).

456803

Add virtual switch feature for FG-140E and FG-140E-POE.

457153

Support for SSL VPN sign on using certificate and remote (LDAP or RADIUS) username/password authentication.

520828

Support VMWare tag filters in ESXi SDN connectors. Support obtaining and filtering of addresses by distributed port group names when a VM is attached to a distributed virtual switch.

529340

Decouple the memory size limit from the private VM license.

538760

Monitor API to check SLBC cluster checksum status. New API added - monitor/system/config-sync/status.

544704

Introduce 802.11ax support for FortiAP-U431F and FortiAP-U433F:

  • Tri-radio support
  • Radio mode 11ax support
  • Dual 5G and single 5G mode support
  • HE (high efficiency)/160 MHz bandwidth/TWT support
550912

Support for link aggregation LACP on entry level FortiGate is extended to all two-digit entry level box for the following models:

FGR-30D, FGR-35D, FG-30E, FG-30E-MI, FG-30E-MN, FG-50E, FG‑51E, FG-52E, FG-60E, FG‑60E-POE, FG-61E, FG‑80D, FG-80E, FG-80E-POE, FG-81E, FG-81E-POE, FG-90E, FG-91E, FG-92D, FWF-30E, FWF-30E-MI, FWF-30E-MN, FWF-50E, FWF-50E-2R, FWF-51E, FWF-60E, FWF-61E

554965

IPv6 is supported in communication between the following:

  • Collector agent and FortiGate
  • Collector agent and DC_agent
  • Collector agent and terminal server agent

556834

Support SSH (SCP/SFTP) file UTM scan.

config ssh-filter profile
    edit [Profile Name]
        set block x11 shell exec port-forward tun-forward sftp scp unknown <==added
        set log x11 shell exec port-forward tun-forward sftp scp unknown <==added
        set default-command-log disable
            config file-filter <==added
                set status enable <==added
                set log enable <==added
                set scan-archive-contents enable <==added
                    config entries <==added
                        edit [Entry] <==added
                            set comment '' <==added
                            set action block <==added
                            set direction any <==added
                            set password-protected any <==added
                            set file-type "msoffice" <==added
                        next
                    end
            end
    next
end

558464

Move SAML configuration to the Security Fabric menu.

  • Move the SAML settings page to a slide with an Advanced Options button on the Security Fabric Settings page.
  • On the Security Fabric Settings page and SAML SSO configuration slide, show SAML toggle and some basic fields: default login page and default login profile for SP, IdP certificate. This way, the workflow to enable downstream SSO can be done from the root FortiGate. The backend will auto-configure the SP.
  • Show a warning message box in the topology tree when the FortiGate does not have SSO configured if the root is the IdP. The Configure button is orange and matches the warning message box.

561707

SR-IOV support for FortiGate on Azure/Hyper-V platforms (VM64-HV, Azure, AzureOnDemand). SR-IOV speeds up Azure networking performance around 4X, so there is more bandwidth and free CPU for other purposes. Normally only first packet along any L4 flow goes to the NetVSC slow path and all others go through the SR-IOV fast path.

568020

Support connector to ClearPass.

  • This feature allows the FortiGate to integrate with ClearPass by providing an API to ClearPass so that it can push endpoint healthy/unhealthy states in real-time over to their firewalls for use in policies. The integration allows for about 3-5 second updates between ClearPass and the FortiGate.
  • CLI changes: add a sub-type for dynamic firewall address.

569708

Support FSSO for dynamic addresses and support ClearPass endpoint connector (via FortiManager).

CLI changes:

  • Add command to show FSSO dynamic address from authd daemon:
    diagnose debug authd fsso show-address
  • Make diagnose firewall dynamic commands to accept one optional parameter as address name:
    diagnose firewall dynamic list
    diagnose firewall dynamic address
  • Add FSSO subtype for firewall address:
    config firewall address
        edit <name>
            set sub-type fsso
        next
    end

GUI changes:

  • Address dialog page
    • New subtype field to select between FSSO and Fabric Connector
    • New FSSO group field to select address group
  • Address list page
  • Tooltip for new FSSO dynamic address supports resolved address
  • Detail column shows the address groups for the address

570207

Support SAML method in firewall and SSL VPN authentications.

CLI changes:

  • Add new CLI setting for SAML user:
    config user saml
        edit *
        set ?
            cert Certificate to sign SAML messages.
            *entity-id SP entity ID.
            *single-sign-on-url SP single sign-on URL.
            single-logout-url SP single logout URL.
            *idp-entity-id IDP entity ID.
            *idp-single-sign-on-url IDP single sign-on URL.
            idp-single-logout-url IDP single logout url.
            *idp-cert IDP Certificate name.
            user-name User name in assertion statement.
            group-name Group name in assertion statement.
        next
    end

573176

Support destination MAC addresses in the sniffer traffic log.

573993

Add UTM log for FortiAnalyzer cloud-based subscription.

CLI changes:

  • Default FortiAnalyzer Cloud filters set to enable
    config log fortianalyzer-cloud filter

Most options within config log fortianalyzer-cloud filter defaulted to disable and could not be changed. Now, they default to enable and can be changed. License-based restrictions still apply, but the configuration can be used to refine the logs being sent to FortiAnalyzer Cloud.

The exception is the dlp-archive option, which is still set to disable and cannot be changed.

575650

Add portal-type external-auth when captive-portal is enabled on local-bridge VAP.

config wireless-controller vap
   edit "wifi.fap.02"
      set ssid "bridge-captive"
      set local-bridging enable
      set security captive-portal
      set portal-type external-auth <==added
      set external-web "170.00.00.000/portal/index.php"
      set radius-server "peap"
   next
end

575770

Increase IPS custom signature length to 4096.

577000

FortiGate debugger Chrome extension support.

The extension improves the quality of GUI bug reports. The extension communicates with FortiOS and allows users to perform a capture. The capture includes (but is not limited to) the following:

  • Screen recording
  • Device metadata
  • Client (browser) metadata
  • HTTP network logs
  • JavaScript console logs
  • Various daemon logs
  • Client memory and CPU usage
  • Device memory and CPU usage

580048

NetFlow using HA reserved management interface.

Changes in CLI

Bug ID

Description

278690

Add https as a type of health check for the VIP load balance monitor.

config firewall ldb-monitor
    edit [Monitor Name]
        set type ?
            ping PING health monitor.
            tcp TCP-connect health monitor.
            http HTTP-GET health monitor.
            https HTTP-GET health monitor with SSL. <==added
    next
end

539800

Remove vdom-modemulti-vdom option for cloud-based ondemand FGT-VM.

config sys global
   set vdom-mode ?
      no-vdom Disable split/multiple VDOMs mode.
      split-vdom Enable split VDOMs mode.
      multi-vdom Enable multiple VDOMs mode. <==removed
end

561235

Remove set type wildcard-fqdn and set wildcard-fqdn <string> from firewall address.

config firewall address
   edit [Address]
      set type wildcard-fqdn     <==removed
      set wildcard-fqdn <string> <==removed
   next
end

562743

Add CLI allowing user to configure socket priority and maximum log rate per remote log device.

Similar setting apply to config log fortiguard setting and config log syslogd setting.

config log fortianalyzer setting
   set priority [default | low]              <==added
   set max-log-rate [Log Rate, unit is MBps] <==added
end

config log fortianalyzer override-setting
   set priority [default | low]              <==added
   set max-log-rate [Log Rate, unit is MBps] <==added
end

563443

Add CLI commands to support address and service negate in consolidated policy.

config firewall consolidated policy
  edit [Policy ID]
     set srcaddr-negate [enable | disable]    <==added
     set dstaddr-negate [enable | disable]    <==added
     set service-negate [enable | disable]    <==added
     set internet-service-negate [enable | disable]        <==added
     set internet-service-src-negate [enable | disable] <==added
  next
end

570047

Remove security rating from FGT_VMX and FGT_SVM.

diagnose security-rating version <==removed

571819

Collect EIP from cloud-VMS (Azure, AWS, GCP, AliCloud, and OCI).

pcui-cloudinit-test # execute <?>
update-eip Update external IP. <==added

config sys interface
   edit [Name]
      set eip                  <==added
   next
end

conf sys global
end

573330

Add external-web-format setting under captive-portal VAP when external portal is selected.

config wireless-controller vap
   edit guestwifi
      set ssid "GuestWiFi"
      set security captive-portal
      set external-web "http://170.00.00.000/portal/index.php"
      set selected-usergroups "Guest-group"
      set intra-vap-privacy enable
      set schedule "always"
      set external-web-format auto-detect <==added
   next
end

573666

Add MPSK schedule that allows setting valid period for MPSK.

config wireless-controller vap
  edit [SSID Interface Name]
      set mpsk enable
      config mpsk-key
          edit [MPSK Entry Name]
              set passphrase 11111111
              set mpsk-schedules "always" <==added
          next
      end
  next
end

574588

Add GRE and L2TP support in WiFi.

config wireless-controller wag-profile <==added
    edit [Profile Name]                <==added
end

config wireless-controller vap
    edit "80e_gre"
        set ssid "FOS-QA_Bruce_80e_gre"
        set local-bridging enable
        set vlanid 3135
        set primary-wag-profile "tunnel" <==added
        set secondary-wag-profile "l2tp" <==added
    next
end
Changes in default behavior

Bug ID

Description

512726

There is no mgmt option in GRE tunnel interface when it is set to dedicated to management.

512986

With mgmt interface set to dedicated to management, added three kinds of cases:

  • When no trust host is set, all IPv4 and IPv6 addresses have access.
  • When only IPv4 addresses are set to trust host, IPv6 address cannot log in.
  • When only IPv6 addresses are set to trust host, IPv4 address cannot log in.

551901

FortiLink interface is on by default on FortiGate E series platform.

  • On FG-100E and higher, create an empty FortiLink aggregate interface (fortilink) by default. If aggregate interface is not supported, create a hardware switch interface instead.
  • For FortiGate models below FG-100E, create an empty FortiLink hardware switch interface (fortilink) by default. If hardware switch interface is not supported, create aggregate interface instead.

566778

Only show diagnose sys nmi-watchdog command on platforms that have NMI button.

573196

When the FortiLink interface is enabled, CLI displays an error message when trying to change the FortiGate to TP mode.

573632

Policy routing will not apply to local out traffic.

Changes in default value

Bug ID

Description

562901

After creating a new VDOM, add default certificates for ssl-cert and ssl-ca-cert under web-proxy setting.

show web-proxy global
config web-proxy global
    set ssl-cert 'Fortinet_Factory'   <==changed
    set ssl-ca-cert 'Fortinet_CA_SSL' <==changed
    set proxy-fqdn "default.fqdn"
end

564746

Change default LLDP setting in wtp-profile from disable to enable.

config wireless-controller wtp-profile
    edit [FAP-Profile]
        set lldp enable <==changed
    end
end

564748

The default channel-utilization setting in wtp-profile is changed from disable to enable.

config wireless-controller wtp-profile
  edit [FAP Profile Name]
     config radio-1
        set channel-utilization enable <==changed
     end
     config radio-2
        set channel-utilization enable <==changed
     end
  next
end
Changes in table size

Bug ID

Description

565408

Increase normal WTP capacity on high-end FortiGates from 1024 to 2048.

Anti Spam

Bug ID

Description

559802 Spam mail can't be checked by anti-spam filter on SMTP protocol.
Anti Virus

Bug ID

Description

545381 When proxy-av is configured for firewall policy, FTP file upload is stopped.

546286

Special archive files are blocked by CIFS profile despite there being no options set to block them in AV.

553143 Redundant logs and alert emails sent when file is sent to FortiSandbox Cloud via Suspicious Files Only.
561524 Cannot send an email with PDF attachment when FortiSandbox Cloud Inspection is enabled.
562037 CDR does not disarm files when they are sent over HTTP-POST even though despite AV logs show file has been disarmed.

575177

Advanced Threat Protection Statistics widget clean file count is incorrect.

580212

Policy in flow mode blocking Adobe creative cloud desktop application.

Application Control

Bug ID

Description

558380 AppCtl does not detect application with webproxy-forward-server.
Data Leak Prevention

Bug ID

Description

522472 DLP logs have a wrong reference link to archived file.

540317

DLP cannot detect attached zip files when receiving emails via MAPI over HTTP.

544881

DLP is not activated when FTPS traffic is encrypted/decrypted by F5, and cleartext traffic goes through the FortiGate.

546964

DLP sensors and DLP options in firewall policy and profile groups are removed.

570379 DLP only detects the first word of file name.
DNS Filter

Bug ID

Description

567172 Enforcing Safe Search in 6.0.5 blocks access to Google domains which makes Safe Search not work.

578267

DNS request to a second DNS server with same Transaction ID is discarded when DNS Filter is enabled on a policy.

581778

Cannot re-order DNS domain filter list.

Explicit Proxy

Bug ID

Description

543794 High CPU due to WAD process.
552334 Website does not work with SSL Deep inspection due to OCSP validation process.
557265 Browser redirect loop after re-authentication when using proxy-re-authentication-mode absolute.
561843 AppCtl unscans the traffic to forwarding to upstream proxy.
564582 Explicit proxy policy treats domain.tld in FQDN firewall address object as wildcard.
567029 WAD crashes at crypto_kxp_xform_block_enc when WAD is restarted while visiting a website after an authentication.
571034 Using disclaimer causes incorrect redirection.
572220 Unable to match the expected firewall proxy-policy when dstint is set to Zone where Zone member has PPPoE interface.
577372 WAD has signal 11 crash at wad_ssl_cert_get_auth_status.

578098

Unwanted traffic log generated for firewall policy with web filter profile as MonitorAll.

File Filter

Bug ID

Description

571811 Enabling SSH filter could result in SFTP/SCP traffic getting stuck because scanunit might not run.
Firewall

Bug ID

Description

539421 Load Balance monitor stats reset after mode change.
540949 Health status of standby server in server load balance not available in GUI or CLI.
545056 Firewall should not be evaluated when an interface bandwidth widget is added to the dashboard.
552329 NP6 sessions dropped after any change in GUI.
554329 Schedule policy is not activated on time.
558689 Traffic dropped by anti replay in ECMP with IPS.
558690 Session timer left at half-open value once established in an ECMP with IPS context.
563471 HTTP load balancing doesn't work after rebooting in Transparent mode.
563928 SFTP connection failure when SSH DPI and app-ctrl are enabled.
564990 Captive-portal-exempt is not supported in consolidated policy.
566951 Unexpected reverse path check failure on IPv6.
570468 FortiGate randomly not processing some NAT64 packets.
570507

Application control causing NAT hairpin traffic to be dropped.

Workaround: Create a new firewall policy from scratch and the default application control can be applied again.

571022 SNAT before encryption in policy-based VPN for local traffic after upgrade from 5.6.8 to 6.0.5.
571832 Provide different protocol/port list when the same ISDB object is used as source/destination.

577752

Policy with a VIP with a destination interface of a zone is dropping packets.

FortiView

Bug ID

Description

527540

On multiple FortiView sub-menus, the Quarantine Host option is no longer available.

537819

FortiView All Sessions page: tooltip of geography IP show 'undefined'.

553627 FortiView pages cannot load with Failed to retrieve FortiView data.
GUI

Bug ID

Description

445074

The MMS profiles pages have been removed from the FortiOS Carrier GUI.

Workaround: You can configure MMS profiles from the CLI using the config firewall mms-profile command.

479692 GUI shows error Image file doesn't match platform even when the user is uploading correct image.

486230

GUI on FG-3800D with 5.6.3 is very slow - configuration with numerous policies.

493704

While accessing the FortiGate page, PC browser memory usage keeps spiking and finally PC hangs.

502740 Remove GUI instructions for Dialup-FortiClient VPN.

504829

GUI should not log out if there is 401 error on downstream device.

513157 Cannot filter on hit count "0" for policy match.
523403 GUI Protocol Port Mapping configuration should be rejected when an invalid port number such as -1 is entered.

526254

Interface page keep loading when VDOM admin have netgrp permission.

528649 vpngrp read or read-write access profile doesn't work properly.
540056 Error message enhancement while creating packet capture in GUI with filter set to high port range.
540737 Should show warning and block user to use no-inspection SSL-SSH profile when any UTM profile is used.
543487 Collected Email Monitor page cannot list the wireless client if connected from captive-portal+email-collection.
543637 Not able to filter the policy by multiple ID.
544313 GUI SD-WAN Monitor page keep loading.
548653 SSO_admin (super_admin) can't open CLI window from GUI. Error says too many concurrent connection.

551064

DNS server GUI calculates latency numbers incorrectly for the web filter service.

552038

Routing monitor network filter does not filter subnets after upgrading.

552552 Personal Privacy in FortiGuard category based filter mistranslated.

555121

Context menu of AP Group has unsupported actions enabled after change view on Managed FortiAPs page.

559799 Webhook automation host header incorrect.

560430

Some app-category cannot be listed on security policy editing page and get JS error.

563053 Warning message for third-party transceivers were removed for 6.2.1 to prevent excessive RMA or support tickets. 6.2.2 re-added the warning for third-party transceivers.

563445

Upgrade NGFW VDOM from v6.2.0, security policy should support virtual-wan-link interface.

564201

After OSPF change via GUI, password for virtual-link will completely disappear and must be re-entered.

564601 Remove the license requirement to upload FortiGuard packages through the GUI when in USG mode.
565109 Add Selected button does not appear under Application Control slide-in when VDOM is enabled.

566666

AP comments do not appear on the columns for Managed AP page.

567452

IPS sensor not configurable in GUI with Firefox.

568176

GUI response is very slow when accessing Route-Monitor page in GUI.

569080 SD-WAN rule GUI page doesn't show red exclamation mark for DST-negate enabled, like firewall policy.
569259 Fabric SAML with FortiManager management. Downstream FortiGate login with SAML super admin only have read-only access on most pages.
571674 GUI config changes generate misleading config event logs.
571828 GUI admin password injected as PSK when adding phase2 configuration on Chrome.
572027 In Log View/FortiView, GUI cannot list logs from FortiAnalyzer on FGT/FWF boxes.
573070 Interface widget not loading fully (keeps spinning) when a VDOM "prof_admin" is used.

573579

Editing policies inline can result in previously selected policies being changed.

573596

GUI shifts central management type to FortiManager after clicking Apply to enable FortiManager Cloud.

573869

Log search index files are never deleted when the log disk is out of space.

574239 AWS/AWSONDEMAND missing dropdown selection box for HTTPS server and WiFi certificates in GUI.

575756

Port Link speed option is missing on the FortiGate GUI after upgrading the managed FortiSwitch to 6.2.1.

575844

Local category for g-default, g-wifi-default web filter profiles should not be displayed.

579259

Firewall User Monitor shows "Failed to retrieve info" and no entries if session-based proxy authentication is used.

583760

After adding few Web Rating Overrides via GUI to an already existing long list of URIs, Web Rating Overrides page is not loaded and keeps spinning.

584304

IpSec Monitor window Bring Up function does not work.

HA

Bug ID

Description

543602 Unnecessary syncing process started during upgrade when it takes longer.
554187 HA secondary unit gets FW Signature un-certified after upgrading image from the primary unit.
555056 Enable 2-factor using vcluster in GUI gets overwritten (sync) by secondary unit.
555998 Load balanced (A-A) secondary unit session doesn't forward traffic after session is dirtied due to FortiManager policy install.
557277 FGSP configured with standalone-config-sync will sync the FortiAnalyzer source IP configuration to the secondary unit.
557473 FGSP found checksum mismatch after replaced one of the units in the cluster.
559172 VLAN in VDOM in virtual cluster not showing virtual MAC for the vcluster.
560096 Restoring config fails on secondary unit when using TACACS+ (primary unit OK).
560107 Cluster upgrade from 5.6.7 build 1653 to SB 5.6.8 build 3667 takes longer than normal.
563551 HASYNC aborts on secondary unit unit.

566108

Some long VDOM name configurations are changed and failed to be in sync after rebooting.

569629

HA A-A local FQDN not resolving on secondary unit.

570235

Incorrect image checksum when upgrading via the GUI.

574564 In an HA configuration with HA uninterruptible upgrade enabled, some signature database files may fail to synchronize upon upgrading from 5.6.9 and earlier to 5.6.10.
575715

Unable to sync the local gateway in FGSP.

576638 HA cluster GUI change does not send logs to the secondary unit immediately.
577115 Primary unit console keeps showing message [ha_auth_set_logon_msg:228] buffer overflow.
578475 FortiGate HA reports not synced if firewall policy of primary and secondary units does not contain the same VIP.

579610

Crash occurs when changing the standalone mode for A-A and A-P in config system ha.

584551

hatalk keeps exchanging heartbeat packet incorrectly with FortiManager.

Intrusion Prevention

Bug ID

Description

545823 Creating/editing a DoS-Policy takes a long time. GUI hangs or displays Error 500: Internal Server Error.

561623

IPS engine 5.009 crashes when updated new FFDB has different size from the old one.

579018

IPS engine 5.030 signal 14 alarm clock crash at nturbo_on_event.

IPsec VPN

Bug ID

Description

449212 New dialup IPsec tunnel in policy mode/mode-cfg overwrites previously established tunnel.
537450 Site-to-site VPN policy based with DDNS destination fail to connect.
553759 ESP packets are sent to the wrong MAC after a routing change when IPsec SA is offloaded.
558693 FWF-90D VPN becomes unresponsive after changing VPN DDNS/Monitor.
559180 The command include-local-lan gets disabled after firewall is rebooted.
560223 Add support for EdDSA certificates for proxy-based deep-inspection / virtual-server when using TLS 1.3. This is resolved by: 0560223, 0561319, 0561820, 0561821, 0561822, 0561823, 0564510.
564237 After configuring SD-WAN and creating SD-WAN rule based on bandwidth criteria, the bandwidth value for tunnel interface is not calculated correctly.

566456

When ipsec phase1-interface name length is 15 (maximum), in dynamic mode with net-device disabled, the client should be able to dial in.

569586 IPsec certificate based IKEv2 VPNs fail to read out certificate subject as username if ECC certificate is involved.
571209 Traffic over VLAN sub-interface pushed through the IPsec policy based VPN interface.

574115

PKI certificates with OU and/or DC as subject fail for PKI user filters.

575238 Redirected traffic on the same interface (ingress and egress interface are the same) is dropped.
575477 IKED memory leak.

576096

mode-cfg IP is missing from the routing table.

577502

OCVPN cannot register - status 'Undefined'.

Log & Report

Bug ID

Description

387294 Country flags in Botnet C&C table and Top Destinations by Bandwidth table are all missing.
545948 FortiGate periodically stops sending syslog messages.
551459 srcintf is unknown-0 in traffic log for service DNS when action is IP connection error.
556199 No logs are generated when using local-in policy on ha-mgmt interface.
558702 miglogd not working until sysctl killall miglogd. Reboot does not help.
565216 Memory of miglogd increase and enter conserve mode.
565505 miglogd high CPU utilization.
566843 No log generated when traffic is blocked by setting tunnel-non-http in web proxy.
568795 Specific traffic type is not logged on FortiAnalyzer/memory.

576024

Set sniffer policy to only log logtraffic=utm but many traffic log stats are still generated in disk or FortiAnalyzer.

Proxy

Bug ID

Description

457347 WAD crashes in wad_http_client_body_done when ICAP is enabled.
544414 WAD handles transparent FTP/FTPS traffic.

550056

When SNI is exempt in an SSL profile, and the SNI does not match the CN, the FortiGate closes the session and does not perform deep inspection.

551119

Certificate blocklist not working correctly in proxy mode.

559166 In firmware 6.0.5, WAD CPU usage on all cores reaches 100% in each around 30s.

560893

When strict SNI check is enabled, FortiGate with certificate inspection cannot block session if SNI does not match CN.

562610 FortiGate generates WAD crash wad_mem_malloc.
563154 Can't open a particular web page via explicit proxy with deep inspection and webfilter profile enabled.

566859

In WAD conserve mode 5.6.8, max_blocks value is high on some workers.

567796 WAD constantly crashes every few seconds.
567942 FortiGate cannot block blacklist certificate against TLS 1.3 if the blacklist certificate server address is exempt.
572489 SSL handshake sometimes fail due to FortiGate replying back FIN to client.
573340 WAD causing memory leak.

573721

For FortiGate with client certificate inspect mode, traffic will trigger WAD crash.

573917 Certain web pages time out.

574171

Fail to connect https://drive.google.com by TLS 1.3.

574730 Wildcard URL filter stops working after upgrade.
576852 WAD process crashes in internet_svc_entry_cmp.

579225

FTP proxy traffic is blocked for FSSO guest users.

581865

In Proxy inspection with Application control and certificate inspection, TLS error for certain web pages, in EDGE browser only.

582714

WAD might leak memory during SSL session ticket resumption.

583736

WAD application crashing in v6.2.1.

580770

SSL decryption breaks App store and Google Play store traffic even though both sites are exempted in the decryption profile.

580943

FortiGate blocklist certificate info is not shown in replace message on certificate inspect case in TLS 1.3.

REST API

Bug ID

Description

566837 HTTPSD process crashes when using REST API.
Routing

Bug ID

Description

558979 ECMP-based session with auxiliary session and IPS is not offloaded in reply direction.
559645 Creating static route from GUI should set Dynamic Gateway disabled by default.
560633 OSPF route for AD-VPN tunnel interface flaps.
562159 ADVPN OSPF unable to ping over ADVPN linknet.

565661

SD-WAN interface bandwidth not honoring its parent's interface estimated bandwidth.

567497 FortiGate sends PIM register messages to RP for group 64.0.0.0 about nonexistent sources.
571714 DHCPv6 relay shows no route to host when there are multiple paths to reach it.
573789 OSPF with virtual clustering not learning routes.

576930

Time stamps missing in routing debugs.

578623

Gradual memory increase with full BGP table.

579884

VRF configuration in WWAN interface has no effect after rebooting.

581488

BGP confederation router sending incorrect AS to neighbor-group routers.

584394

VRRP on LAG cannot forward packet after vrrp-virtual-mac is enabled.

630758

When obsolete ISDB ID is used in static route, default route is created after reboot.

SSL VPN

Bug ID

Description

476377

SSL VPN FortiClient login with FAC user FTM two-factor fail because it times out too fast.

478957

SSL VPN web portal login history is not displayed if logs are stored in FortiAnalyzer.

481038

Web application is not loading through SSL VPN portal.

491733

When SSL VPN receives multiple HTTPS post requests under web filter, read_request_data_f loops even when client is stopped, which causes the SSL VPN process to use 99% of CPU.

496584

SSL VPN bad password attempt causes excessive bind requests against LDAP and lockout of accounts.

515889

SSL VPN web mode has trouble loading internal web application.

525172

A web application accessed through SSL VPN web mode triggers Error 500 on Java server.

530509

Invalid HTTP Request when SMB via SSL VPN bookmark is executed with MS Server 2016, but works fine with MS server 2008R2.

531848

FortiSIEM web GUI does not load on web portal.

537341

SSL bookmark is not loading SAP portal information.

545177

Web mode fails for SharePoint page.

549654

Citrix bookmarks should be disabled in SSL VPN portal.

549994

SSL VPN web mode logon page should not show Skip button for remote user with Force password change on next logon.

551695

Office365 applications through SSL VPN bookmarks.

555344

Downloading PDF file through SSL VPN portal.

555611

SSL VPN web mode web forward not working for video camera system after upgrade to 6.0.4.

558076

In firmware 6.2.0, RDWeb (Windows Server 2016) via SSL web portal does not work.

558080

McAfee ESM 11 display issues in SSL VPN web portal.

558473

For FG-200E, after upgrading from 6.0.4 to 6.2.0, SSL VPN HTTPS bBookmark does not load (Secure Connection Failed).

559171

With SSL VPN web mode unable to get dropdown menu from internal web page.

559785

FortiMail login page with SSL VPN portal not displaying correctly.

560438

interface subnet object not available in SSL VPN split-tunneling-routing-address.

560505

SharePoint 2019 page access fails using web mode.

560730

SSL VPN web mode SSO doesn't work for some site like FAc login.

560747

The referer header is not correct, and some files are not loaded properly.

563147

Connection to internal portal freezes when using SSL VPN web bookmark.

563798

Redirect in bookmark is not loading.

564850

Object from CARL source not showing through SSL VPN web mode.

564871

SSL VPN users create multiple connections.

565675

When using LDAP-integrated certificate authentication, getting connected takes too long. It does not connect until the session expires.

567182

In SSL VPN web mode, videos on internal website won't display.

567626

SSL VPN still allows password expired users to change password and get access.

567628

SSL VPN banned-cipher SHA256 not completely working.

567987

In SSL VPN web mode, RDP disconnects when copying long text from remote to local.

568292

SSL VPN RDP SSO bookmark does not send domain name for domain users.

568481

Internal website using java is not accessed using SSL VPN web mode.

568838

Internal website not working through SSL VPN web mode.

569030

SSL VPN tunnel mode can only add split tunneling of user's policy with groups and its users in different SSL VPN policies.

569711

Error for proxy ssh database through SSL VPN.

570445

CMAT application through SSL VPN not working properly.

570620

SSL VPN web mode does not work properly for the website using JavaScript.

571005

NextCloud through SSL VPN behaving strangely.

571479

Cannot access sub-menus from the internal main website through the bookmark when using SSL VPN web mode.

571721

Local portal adzh-srop-nidm02.intern.cube.ch needs more than 10 min. to load via SSL VPN bookmark.

572653

Unable to access Qlik Sense URL via SSL VPN web mode .

573527

SSL web portal CSP v3 compatibility issue.

573727

Cannot establish SSL VPN connection using FortiClient for macOS when os-check is enabled and action is allow.

573853

TX packet drops on ssl.root interface.

574551

Subpages on internal websites are not working via SSL VPN web mode (Tunnel mode is OK).

574724

In some lower-end FortiGates, the threshold of available memory is not calculated correctly for entering SSL VPN conserve mode. Threshold should be 10% of total memory when the memory is larger than 512 MB and less than 2 GB.

575248

Synology DSM login page is not displayed when accessed via SSL VPN bookmark or connection tool.

575259

SSL VPN connection is being dropped intermittently.

576013

The SSL VPN web mode webserver link is not rewritten correctly after login.

577522

SSL VPN daemon crashes when logging in several times with RADIUS user that is related to a framed IP address.

578581

SSL web mode VPN portal freezing when opening some websites using JavaScript.

580182

The EOASIS website is not displayed properly using SSL VPN web mode.

580384

SSL VPN web mode not redirecting URL as expected after successful login.

581863

Accessing http://nlyte.ote.gr/nlyte/ configured with bookmark name 'NLYTE' not getting authentication page.

582161

Internal web application is not accessible through web SSL VPN.

Switch Controller

Bug ID

Description

557280 Need to add FSW port information on Security Fabric and device inventory the same as before 6.0.4.
563939 802-1X timer reauth-period option 0 doesn't work.
System

Bug ID

Description

423311 200E/201E software switch span function does not work.
470875 OID seems to be COUNTER32 instead of GAUGE32.
498599 Can't create loopback interface by VDOM admin if there's no physical interface in VDOM.
520283 Can't show global setting when VDOM admin run exec tac report command.
531675 SFP ports do not link down when SFP cat5 interface status of FortiGate on the other side goes down.
539970 Kernel panic on HA pair of 301E.
540083 Partial traffic outage with softirq on 100%.

543518

Anti-replay check fails when crossing NP6 with IPS enabled on FG-2500E.

545449 IPinIP traffic over another IPinIP is dropped in NP6-Lite when offloading is enabled.

550091

On a FortiGate trusted by FortiAnalyzer via certificate, the FortiGate loses the connection to FortiAnalyzer if it returns an invalid SN (old FortiAnalyzer VM license or bad FortiAnalyzer certificate).

550206

Memory (SKB) which is no longer needed is not released in NP6 and NP6lite drivers (100E, 140E, 3600D, 3800D).

551281 process_tunnel_timeout_notify:377, send timeout notify message error -1 1 message printed in console.
557172 When there are many application-control based Internet-service entries in SD-WAN, system performance is affected by high CPU usage of softirq.
557527 FortiGate as L2TP client does not negotiate correctly.
557798 High memory utilization caused by authd.
559467 Support four DNS records inside DHCP offer.
560411 3980E unresponsive with millions of sessions in TIME_WAIT.
560686 4x10 G split-port does not work on FG-3700D rev 2.
561097 SD-WAN rule corrupted on reboot after ISDB update.
561234 FG-800D shows wrong HA, ALARM LED status.
561929 REST API cmdb/router/aspath-list is not inserting new values.
562049 TLS 1.3 resumption and Pre-Shared Key (PSK) fail if Hello Retry Request is received.
563232 Authorization fails when 0.0.0.0/0 is listed as the trusted host.
563497 The trust-ip-x feature on interface does not work.
564184 Split DNS not working. CNAME fails to resolve.
564579 Updated crash signal 14, object creation not allowed from cli errno=Resource temporarily unavailable.
564911 DHCPDISCOVERY NATed with TP management IP when sent to NAT VDOM .
565291 SD-WAN rule doesn't work with nested firewall address group selected as source or destination.
565296 Wrong configuration transmitted by FOS to FortiManager under certain conditions.
565631 DHCP relay sessions are removed from the session table after applying any config change.

566615

Sometimes FG-5001E image is not able to sync with the 5913C blade.

567487

CPU goes to 100% when modifying members of an addrgrp object.

567504 Speed test break the cluster.
568215 Kernel bug at net/core/skbuff.

568451

Add support for # character in SNMP community name.

569652 High memory utilization after FortiOS and IPS engine upgrade.
570227 FortiGate is not selecting an NTP server that has a clock time in the majority clique of other NTP servers.

570575

PoE ports no longer deliver power.

570834 STP (spanning tree) flapping.
571207 DHCP with manual address does not provide subnetmask in DHCP ACK.

571720

Using DHCP to acquire addresses for mode-config with certificates fails to send DHCP request.

572411 Timezone for Canary Islands is missing.
572428 lldptx - Application Crashed - Signal 11 Segmentation Fault.

572539

Dnsproxy is killed every 2 seconds and has crash error.

572706

With LLDP, FortiGate serial number is sent in plain text.

572707 Configuration is corrupted when restoring a VDOM.
572763 softirq causing high CPU when session increase in an acceptable way.

573177

GUI cannot save edits made on replacement messages in a VDOM. When using CLI, user gets logged out while editing.

574086 Kernel panic occurs after upgrading from 6.2.0 to 6.2.1.
574110 When adding admin down interface as a member of aggregate interface, it shows up and process the traffic.

574327

FortiGate CSR traffic to SCEP srv generated from the root VDOM instead of the VDOM we create the CSR.

574991

FortiGate can't extract the user principal name UPN from user certificate when certificate contains UPN and additional names.

576063 Crash log keeps having cid could not load sigs after FortiGate is authed into FortiManager.

577047

FortiGate takes a long time to reboot when it has many firewall addresses used in many policies.

577302 Virtual WAN Link process (vwl) memory usage keeps increasing after upgrading to 6.2.1.

578531

forticldd deamon resolved mgrctrl1.fortinet.com to wrong IP address.

578746

FortiGate does not accept FortiManager created country code and causes address install fails.

579524 DHCP lease is not stable and dhcpd process crashes.

580185

authd4 crashes when deleting a VDOM or rebooting the FortiGate.

580883

DNS servers acquired via PPPoE in non-management VDOMs are used for DHCP DNS server option 6.

582547

fgfmsd crash makes connection to FortiManager go down.

Upgrade

Bug ID

Description

550410 Cannot edit addrgrp which includes wildcardfqdn object after upgrade from v5.6.x.
556002 Some firewall policies were deleted after upgrade from FOS 6.0.4 to FOS 6.2.0.
558995 L2 WCCP stops working after upgrade to FOS 6.0.3 or newer.
562444 The firewall policy with internet-service enabled was lost after upgrade from 6.0.5.

580450

Policies removed after an upgrade in NGFW Policy Mode: maximum number of entries has been reached.

586123

Service group lost default members when restoring a configuration file via VDOM.

User & Device

Bug ID

Description

547657 Guest portal RADIUS authentication failure due to FortiAuthenticator trying to resolve third-party websites as access points.
549394 fnbamd crashes frequently.

557947

Non-RSSO RADIUS server shows in FSSO GUI, which should only show RSSO RADIUS servers.

558332 CoA from FAC is not working for FortiGate wired interface based captive portal.

561235

FQDN address objects resolution is failing when used in the captive web portal as walled garden rules.

561289 User-based Kerberos Authentication not working in new VDOM.
561610 src-vis process memory leak.
562185 Disclaimer redirection to IP instead of FQDN results in Certificate/SSL warning.
562861 RADIUS CoA (disconnect request) not working with use-management-vdom.
567990 Hard-timeout setting not working for captive portal.

572645

Importing PKCS #12 certificate files on the System > Certificates page does not work (CLI works).

575096

Copying and pasting the local certificate and private key in the FortiGate terminal session no longer works.

581519

Creating SCEP enrollment in context global no longer seems to work if VDOM is configured as the management VDOM.

VM

Bug ID

Description

524052

Application cloudinitd has signal 11 crash on FortiGate-VM64-GCP.

561083

VPN tunnels not coming up after HA failover in GCP.

561909

Azure SDN connector try querying invalid FQDN when using Azure Stack Integrated systems.

567137

VM in Oracle cloud has 100% CPU usage in system space.

569643

Kernel crashes when IPsec traffic is handled by the QAT device.

570176

HA cluster multi AZ does not failover IPsec VPN in AWS with TGW.

571652

OCI SDN connector gets HTTP response err:500 when enabling use-metadata-iam.

572039

EMAC VLAN is not supported on VM.

573952

FGT-VM with network driver vmxnet3 has lots of fragments when testing throughput.

575400

In Azure SDN, the firewall address filter cannot fetch the secondary public and private IP addresses of the NICs.

578727

FGTVM_OPC unable to failover the route properly during failover.

578966

OpenStack PCI passthrough sub interface VLAN cannot received traffic.

580738

In the Cluster setup, secondary unit can have different fingerprint for the OCI SDN connector, which can cause unit to fail to connect to OCI metatdata server properly.

580911

EIP assigned to the secondary IP address on the OCI do not 't fail over during HA failover.

577856

Add missing AWS HA failover error log and set firewall.vip/vip46/vip6/vip64 not sync'ing when cross zone HA is configured.

VoIP

Bug ID

Description

570430

SIP ALG generates a VoIP session with wrong direction.

580588

SDP information fields are not being NATted in Multipart Media Encapsulation traffic.

WAN Optimization

Bug ID

Description

564290

FortiOS cannot collaborate web cache with FortiProxy successfully.

Web Filter

Bug ID

Description

356487

When central-management is NONE, include-default-servers setting is not honored by rating.

549928

Block page images not loading for web sites protected by HSTS.

553593

CLI diagnose debug urlfilter test-url <url> response is URL test cache miss even though the test-url is in the web filter rating cache.

565952

Proxy-based web filter breaks WCCP traffic.

584898

FortiGuard flow web filter cannot block TLS 1.3 website under certificate inspection.

WiFi Controller

Bug ID

Description

540027

FortiWiFi working as client mode cannot see and connect to the hotspot SSID from iOS devices.

559370

darrp-optimize-schedules configurations move to the global settings instead of VDOM.

560828

When the NGFW mode is set to policy-based, FortiAPs cannot be managed when dtls-policy is ipsec-vpn.

569966

WPA2-Enterprise SSID authentication cannot utilize the source IP setting in RADIUS server configuration.

570745

FAPs detecting BSSIDs of others FAPs managed by the same WC as Fake-ap-on-air.

573024

FAP cannot be managed by FortiGate when admin trusthost is configured.

577394

hostapd (wpad_ac) crashed while removing RADIUS accounting servers.

579908

Tunnel mode SSID packet loss seen from FAP-U24JEV and 800 connected APs.

580793

Auto-generated consolidated policy should skip saving in configuration file/CMDB.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

551549

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-9494
  • CVE-2019-9495

565708

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-6696

567521

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-6697

569310

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-15703

577643

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-15706

578626

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-15705

Resolved issues

Resolved issues

The following issues have been fixed in version 6.2.2. For inquires about a particular bug, please contact Customer Service & Support.

New features or enhancements

Bug ID

Description

379089

Enable CPU hot plug-in kernel configuration with execute cpu show and execute cpu add.

437116

For DFS-approved countries, add 160 MHz Channel Bonding support for FortiAP U421EV, U422EV, and U423EV models (edit [FAPU421EV-default | FAPU422EV-default | FAPU423EV-default]).

456803

Add virtual switch feature for FG-140E and FG-140E-POE.

457153

Support for SSL VPN sign on using certificate and remote (LDAP or RADIUS) username/password authentication.

520828

Support VMWare tag filters in ESXi SDN connectors. Support obtaining and filtering of addresses by distributed port group names when a VM is attached to a distributed virtual switch.

529340

Decouple the memory size limit from the private VM license.

538760

Monitor API to check SLBC cluster checksum status. New API added - monitor/system/config-sync/status.

544704

Introduce 802.11ax support for FortiAP-U431F and FortiAP-U433F:

  • Tri-radio support
  • Radio mode 11ax support
  • Dual 5G and single 5G mode support
  • HE (high efficiency)/160 MHz bandwidth/TWT support
550912

Support for link aggregation LACP on entry level FortiGate is extended to all two-digit entry level box for the following models:

FGR-30D, FGR-35D, FG-30E, FG-30E-MI, FG-30E-MN, FG-50E, FG‑51E, FG-52E, FG-60E, FG‑60E-POE, FG-61E, FG‑80D, FG-80E, FG-80E-POE, FG-81E, FG-81E-POE, FG-90E, FG-91E, FG-92D, FWF-30E, FWF-30E-MI, FWF-30E-MN, FWF-50E, FWF-50E-2R, FWF-51E, FWF-60E, FWF-61E

554965

IPv6 is supported in communication between the following:

  • Collector agent and FortiGate
  • Collector agent and DC_agent
  • Collector agent and terminal server agent

556834

Support SSH (SCP/SFTP) file UTM scan.

config ssh-filter profile
    edit [Profile Name]
        set block x11 shell exec port-forward tun-forward sftp scp unknown <==added
        set log x11 shell exec port-forward tun-forward sftp scp unknown <==added
        set default-command-log disable
            config file-filter <==added
                set status enable <==added
                set log enable <==added
                set scan-archive-contents enable <==added
                    config entries <==added
                        edit [Entry] <==added
                            set comment '' <==added
                            set action block <==added
                            set direction any <==added
                            set password-protected any <==added
                            set file-type "msoffice" <==added
                        next
                    end
            end
    next
end

558464

Move SAML configuration to the Security Fabric menu.

  • Move the SAML settings page to a slide with an Advanced Options button on the Security Fabric Settings page.
  • On the Security Fabric Settings page and SAML SSO configuration slide, show SAML toggle and some basic fields: default login page and default login profile for SP, IdP certificate. This way, the workflow to enable downstream SSO can be done from the root FortiGate. The backend will auto-configure the SP.
  • Show a warning message box in the topology tree when the FortiGate does not have SSO configured if the root is the IdP. The Configure button is orange and matches the warning message box.

561707

SR-IOV support for FortiGate on Azure/Hyper-V platforms (VM64-HV, Azure, AzureOnDemand). SR-IOV speeds up Azure networking performance around 4X, so there is more bandwidth and free CPU for other purposes. Normally only first packet along any L4 flow goes to the NetVSC slow path and all others go through the SR-IOV fast path.

568020

Support connector to ClearPass.

  • This feature allows the FortiGate to integrate with ClearPass by providing an API to ClearPass so that it can push endpoint healthy/unhealthy states in real-time over to their firewalls for use in policies. The integration allows for about 3-5 second updates between ClearPass and the FortiGate.
  • CLI changes: add a sub-type for dynamic firewall address.

569708

Support FSSO for dynamic addresses and support ClearPass endpoint connector (via FortiManager).

CLI changes:

  • Add command to show FSSO dynamic address from authd daemon:
    diagnose debug authd fsso show-address
  • Make diagnose firewall dynamic commands to accept one optional parameter as address name:
    diagnose firewall dynamic list
    diagnose firewall dynamic address
  • Add FSSO subtype for firewall address:
    config firewall address
        edit <name>
            set sub-type fsso
        next
    end

GUI changes:

  • Address dialog page
    • New subtype field to select between FSSO and Fabric Connector
    • New FSSO group field to select address group
  • Address list page
  • Tooltip for new FSSO dynamic address supports resolved address
  • Detail column shows the address groups for the address

570207

Support SAML method in firewall and SSL VPN authentications.

CLI changes:

  • Add new CLI setting for SAML user:
    config user saml
        edit *
        set ?
            cert Certificate to sign SAML messages.
            *entity-id SP entity ID.
            *single-sign-on-url SP single sign-on URL.
            single-logout-url SP single logout URL.
            *idp-entity-id IDP entity ID.
            *idp-single-sign-on-url IDP single sign-on URL.
            idp-single-logout-url IDP single logout url.
            *idp-cert IDP Certificate name.
            user-name User name in assertion statement.
            group-name Group name in assertion statement.
        next
    end

573176

Support destination MAC addresses in the sniffer traffic log.

573993

Add UTM log for FortiAnalyzer cloud-based subscription.

CLI changes:

  • Default FortiAnalyzer Cloud filters set to enable
    config log fortianalyzer-cloud filter

Most options within config log fortianalyzer-cloud filter defaulted to disable and could not be changed. Now, they default to enable and can be changed. License-based restrictions still apply, but the configuration can be used to refine the logs being sent to FortiAnalyzer Cloud.

The exception is the dlp-archive option, which is still set to disable and cannot be changed.

575650

Add portal-type external-auth when captive-portal is enabled on local-bridge VAP.

config wireless-controller vap
   edit "wifi.fap.02"
      set ssid "bridge-captive"
      set local-bridging enable
      set security captive-portal
      set portal-type external-auth <==added
      set external-web "170.00.00.000/portal/index.php"
      set radius-server "peap"
   next
end

575770

Increase IPS custom signature length to 4096.

577000

FortiGate debugger Chrome extension support.

The extension improves the quality of GUI bug reports. The extension communicates with FortiOS and allows users to perform a capture. The capture includes (but is not limited to) the following:

  • Screen recording
  • Device metadata
  • Client (browser) metadata
  • HTTP network logs
  • JavaScript console logs
  • Various daemon logs
  • Client memory and CPU usage
  • Device memory and CPU usage

580048

NetFlow using HA reserved management interface.

Changes in CLI

Bug ID

Description

278690

Add https as a type of health check for the VIP load balance monitor.

config firewall ldb-monitor
    edit [Monitor Name]
        set type ?
            ping PING health monitor.
            tcp TCP-connect health monitor.
            http HTTP-GET health monitor.
            https HTTP-GET health monitor with SSL. <==added
    next
end

539800

Remove vdom-modemulti-vdom option for cloud-based ondemand FGT-VM.

config sys global
   set vdom-mode ?
      no-vdom Disable split/multiple VDOMs mode.
      split-vdom Enable split VDOMs mode.
      multi-vdom Enable multiple VDOMs mode. <==removed
end

561235

Remove set type wildcard-fqdn and set wildcard-fqdn <string> from firewall address.

config firewall address
   edit [Address]
      set type wildcard-fqdn     <==removed
      set wildcard-fqdn <string> <==removed
   next
end

562743

Add CLI allowing user to configure socket priority and maximum log rate per remote log device.

Similar setting apply to config log fortiguard setting and config log syslogd setting.

config log fortianalyzer setting
   set priority [default | low]              <==added
   set max-log-rate [Log Rate, unit is MBps] <==added
end

config log fortianalyzer override-setting
   set priority [default | low]              <==added
   set max-log-rate [Log Rate, unit is MBps] <==added
end

563443

Add CLI commands to support address and service negate in consolidated policy.

config firewall consolidated policy
  edit [Policy ID]
     set srcaddr-negate [enable | disable]    <==added
     set dstaddr-negate [enable | disable]    <==added
     set service-negate [enable | disable]    <==added
     set internet-service-negate [enable | disable]        <==added
     set internet-service-src-negate [enable | disable] <==added
  next
end

570047

Remove security rating from FGT_VMX and FGT_SVM.

diagnose security-rating version <==removed

571819

Collect EIP from cloud-VMS (Azure, AWS, GCP, AliCloud, and OCI).

pcui-cloudinit-test # execute <?>
update-eip Update external IP. <==added

config sys interface
   edit [Name]
      set eip                  <==added
   next
end

conf sys global
end

573330

Add external-web-format setting under captive-portal VAP when external portal is selected.

config wireless-controller vap
   edit guestwifi
      set ssid "GuestWiFi"
      set security captive-portal
      set external-web "http://170.00.00.000/portal/index.php"
      set selected-usergroups "Guest-group"
      set intra-vap-privacy enable
      set schedule "always"
      set external-web-format auto-detect <==added
   next
end

573666

Add MPSK schedule that allows setting valid period for MPSK.

config wireless-controller vap
  edit [SSID Interface Name]
      set mpsk enable
      config mpsk-key
          edit [MPSK Entry Name]
              set passphrase 11111111
              set mpsk-schedules "always" <==added
          next
      end
  next
end

574588

Add GRE and L2TP support in WiFi.

config wireless-controller wag-profile <==added
    edit [Profile Name]                <==added
end

config wireless-controller vap
    edit "80e_gre"
        set ssid "FOS-QA_Bruce_80e_gre"
        set local-bridging enable
        set vlanid 3135
        set primary-wag-profile "tunnel" <==added
        set secondary-wag-profile "l2tp" <==added
    next
end
Changes in default behavior

Bug ID

Description

512726

There is no mgmt option in GRE tunnel interface when it is set to dedicated to management.

512986

With mgmt interface set to dedicated to management, added three kinds of cases:

  • When no trust host is set, all IPv4 and IPv6 addresses have access.
  • When only IPv4 addresses are set to trust host, IPv6 address cannot log in.
  • When only IPv6 addresses are set to trust host, IPv4 address cannot log in.

551901

FortiLink interface is on by default on FortiGate E series platform.

  • On FG-100E and higher, create an empty FortiLink aggregate interface (fortilink) by default. If aggregate interface is not supported, create a hardware switch interface instead.
  • For FortiGate models below FG-100E, create an empty FortiLink hardware switch interface (fortilink) by default. If hardware switch interface is not supported, create aggregate interface instead.

566778

Only show diagnose sys nmi-watchdog command on platforms that have NMI button.

573196

When the FortiLink interface is enabled, CLI displays an error message when trying to change the FortiGate to TP mode.

573632

Policy routing will not apply to local out traffic.

Changes in default value

Bug ID

Description

562901

After creating a new VDOM, add default certificates for ssl-cert and ssl-ca-cert under web-proxy setting.

show web-proxy global
config web-proxy global
    set ssl-cert 'Fortinet_Factory'   <==changed
    set ssl-ca-cert 'Fortinet_CA_SSL' <==changed
    set proxy-fqdn "default.fqdn"
end

564746

Change default LLDP setting in wtp-profile from disable to enable.

config wireless-controller wtp-profile
    edit [FAP-Profile]
        set lldp enable <==changed
    end
end

564748

The default channel-utilization setting in wtp-profile is changed from disable to enable.

config wireless-controller wtp-profile
  edit [FAP Profile Name]
     config radio-1
        set channel-utilization enable <==changed
     end
     config radio-2
        set channel-utilization enable <==changed
     end
  next
end
Changes in table size

Bug ID

Description

565408

Increase normal WTP capacity on high-end FortiGates from 1024 to 2048.

Anti Spam

Bug ID

Description

559802 Spam mail can't be checked by anti-spam filter on SMTP protocol.
Anti Virus

Bug ID

Description

545381 When proxy-av is configured for firewall policy, FTP file upload is stopped.

546286

Special archive files are blocked by CIFS profile despite there being no options set to block them in AV.

553143 Redundant logs and alert emails sent when file is sent to FortiSandbox Cloud via Suspicious Files Only.
561524 Cannot send an email with PDF attachment when FortiSandbox Cloud Inspection is enabled.
562037 CDR does not disarm files when they are sent over HTTP-POST even though despite AV logs show file has been disarmed.

575177

Advanced Threat Protection Statistics widget clean file count is incorrect.

580212

Policy in flow mode blocking Adobe creative cloud desktop application.

Application Control

Bug ID

Description

558380 AppCtl does not detect application with webproxy-forward-server.
Data Leak Prevention

Bug ID

Description

522472 DLP logs have a wrong reference link to archived file.

540317

DLP cannot detect attached zip files when receiving emails via MAPI over HTTP.

544881

DLP is not activated when FTPS traffic is encrypted/decrypted by F5, and cleartext traffic goes through the FortiGate.

546964

DLP sensors and DLP options in firewall policy and profile groups are removed.

570379 DLP only detects the first word of file name.
DNS Filter

Bug ID

Description

567172 Enforcing Safe Search in 6.0.5 blocks access to Google domains which makes Safe Search not work.

578267

DNS request to a second DNS server with same Transaction ID is discarded when DNS Filter is enabled on a policy.

581778

Cannot re-order DNS domain filter list.

Explicit Proxy

Bug ID

Description

543794 High CPU due to WAD process.
552334 Website does not work with SSL Deep inspection due to OCSP validation process.
557265 Browser redirect loop after re-authentication when using proxy-re-authentication-mode absolute.
561843 AppCtl unscans the traffic to forwarding to upstream proxy.
564582 Explicit proxy policy treats domain.tld in FQDN firewall address object as wildcard.
567029 WAD crashes at crypto_kxp_xform_block_enc when WAD is restarted while visiting a website after an authentication.
571034 Using disclaimer causes incorrect redirection.
572220 Unable to match the expected firewall proxy-policy when dstint is set to Zone where Zone member has PPPoE interface.
577372 WAD has signal 11 crash at wad_ssl_cert_get_auth_status.

578098

Unwanted traffic log generated for firewall policy with web filter profile as MonitorAll.

File Filter

Bug ID

Description

571811 Enabling SSH filter could result in SFTP/SCP traffic getting stuck because scanunit might not run.
Firewall

Bug ID

Description

539421 Load Balance monitor stats reset after mode change.
540949 Health status of standby server in server load balance not available in GUI or CLI.
545056 Firewall should not be evaluated when an interface bandwidth widget is added to the dashboard.
552329 NP6 sessions dropped after any change in GUI.
554329 Schedule policy is not activated on time.
558689 Traffic dropped by anti replay in ECMP with IPS.
558690 Session timer left at half-open value once established in an ECMP with IPS context.
563471 HTTP load balancing doesn't work after rebooting in Transparent mode.
563928 SFTP connection failure when SSH DPI and app-ctrl are enabled.
564990 Captive-portal-exempt is not supported in consolidated policy.
566951 Unexpected reverse path check failure on IPv6.
570468 FortiGate randomly not processing some NAT64 packets.
570507

Application control causing NAT hairpin traffic to be dropped.

Workaround: Create a new firewall policy from scratch and the default application control can be applied again.

571022 SNAT before encryption in policy-based VPN for local traffic after upgrade from 5.6.8 to 6.0.5.
571832 Provide different protocol/port list when the same ISDB object is used as source/destination.

577752

Policy with a VIP with a destination interface of a zone is dropping packets.

FortiView

Bug ID

Description

527540

On multiple FortiView sub-menus, the Quarantine Host option is no longer available.

537819

FortiView All Sessions page: tooltip of geography IP show 'undefined'.

553627 FortiView pages cannot load with Failed to retrieve FortiView data.
GUI

Bug ID

Description

445074

The MMS profiles pages have been removed from the FortiOS Carrier GUI.

Workaround: You can configure MMS profiles from the CLI using the config firewall mms-profile command.

479692 GUI shows error Image file doesn't match platform even when the user is uploading correct image.

486230

GUI on FG-3800D with 5.6.3 is very slow - configuration with numerous policies.

493704

While accessing the FortiGate page, PC browser memory usage keeps spiking and finally PC hangs.

502740 Remove GUI instructions for Dialup-FortiClient VPN.

504829

GUI should not log out if there is 401 error on downstream device.

513157 Cannot filter on hit count "0" for policy match.
523403 GUI Protocol Port Mapping configuration should be rejected when an invalid port number such as -1 is entered.

526254

Interface page keep loading when VDOM admin have netgrp permission.

528649 vpngrp read or read-write access profile doesn't work properly.
540056 Error message enhancement while creating packet capture in GUI with filter set to high port range.
540737 Should show warning and block user to use no-inspection SSL-SSH profile when any UTM profile is used.
543487 Collected Email Monitor page cannot list the wireless client if connected from captive-portal+email-collection.
543637 Not able to filter the policy by multiple ID.
544313 GUI SD-WAN Monitor page keep loading.
548653 SSO_admin (super_admin) can't open CLI window from GUI. Error says too many concurrent connection.

551064

DNS server GUI calculates latency numbers incorrectly for the web filter service.

552038

Routing monitor network filter does not filter subnets after upgrading.

552552 Personal Privacy in FortiGuard category based filter mistranslated.

555121

Context menu of AP Group has unsupported actions enabled after change view on Managed FortiAPs page.

559799 Webhook automation host header incorrect.

560430

Some app-category cannot be listed on security policy editing page and get JS error.

563053 Warning message for third-party transceivers were removed for 6.2.1 to prevent excessive RMA or support tickets. 6.2.2 re-added the warning for third-party transceivers.

563445

Upgrade NGFW VDOM from v6.2.0, security policy should support virtual-wan-link interface.

564201

After OSPF change via GUI, password for virtual-link will completely disappear and must be re-entered.

564601 Remove the license requirement to upload FortiGuard packages through the GUI when in USG mode.
565109 Add Selected button does not appear under Application Control slide-in when VDOM is enabled.

566666

AP comments do not appear on the columns for Managed AP page.

567452

IPS sensor not configurable in GUI with Firefox.

568176

GUI response is very slow when accessing Route-Monitor page in GUI.

569080 SD-WAN rule GUI page doesn't show red exclamation mark for DST-negate enabled, like firewall policy.
569259 Fabric SAML with FortiManager management. Downstream FortiGate login with SAML super admin only have read-only access on most pages.
571674 GUI config changes generate misleading config event logs.
571828 GUI admin password injected as PSK when adding phase2 configuration on Chrome.
572027 In Log View/FortiView, GUI cannot list logs from FortiAnalyzer on FGT/FWF boxes.
573070 Interface widget not loading fully (keeps spinning) when a VDOM "prof_admin" is used.

573579

Editing policies inline can result in previously selected policies being changed.

573596

GUI shifts central management type to FortiManager after clicking Apply to enable FortiManager Cloud.

573869

Log search index files are never deleted when the log disk is out of space.

574239 AWS/AWSONDEMAND missing dropdown selection box for HTTPS server and WiFi certificates in GUI.

575756

Port Link speed option is missing on the FortiGate GUI after upgrading the managed FortiSwitch to 6.2.1.

575844

Local category for g-default, g-wifi-default web filter profiles should not be displayed.

579259

Firewall User Monitor shows "Failed to retrieve info" and no entries if session-based proxy authentication is used.

583760

After adding few Web Rating Overrides via GUI to an already existing long list of URIs, Web Rating Overrides page is not loaded and keeps spinning.

584304

IpSec Monitor window Bring Up function does not work.

HA

Bug ID

Description

543602 Unnecessary syncing process started during upgrade when it takes longer.
554187 HA secondary unit gets FW Signature un-certified after upgrading image from the primary unit.
555056 Enable 2-factor using vcluster in GUI gets overwritten (sync) by secondary unit.
555998 Load balanced (A-A) secondary unit session doesn't forward traffic after session is dirtied due to FortiManager policy install.
557277 FGSP configured with standalone-config-sync will sync the FortiAnalyzer source IP configuration to the secondary unit.
557473 FGSP found checksum mismatch after replaced one of the units in the cluster.
559172 VLAN in VDOM in virtual cluster not showing virtual MAC for the vcluster.
560096 Restoring config fails on secondary unit when using TACACS+ (primary unit OK).
560107 Cluster upgrade from 5.6.7 build 1653 to SB 5.6.8 build 3667 takes longer than normal.
563551 HASYNC aborts on secondary unit unit.

566108

Some long VDOM name configurations are changed and failed to be in sync after rebooting.

569629

HA A-A local FQDN not resolving on secondary unit.

570235

Incorrect image checksum when upgrading via the GUI.

574564 In an HA configuration with HA uninterruptible upgrade enabled, some signature database files may fail to synchronize upon upgrading from 5.6.9 and earlier to 5.6.10.
575715

Unable to sync the local gateway in FGSP.

576638 HA cluster GUI change does not send logs to the secondary unit immediately.
577115 Primary unit console keeps showing message [ha_auth_set_logon_msg:228] buffer overflow.
578475 FortiGate HA reports not synced if firewall policy of primary and secondary units does not contain the same VIP.

579610

Crash occurs when changing the standalone mode for A-A and A-P in config system ha.

584551

hatalk keeps exchanging heartbeat packet incorrectly with FortiManager.

Intrusion Prevention

Bug ID

Description

545823 Creating/editing a DoS-Policy takes a long time. GUI hangs or displays Error 500: Internal Server Error.

561623

IPS engine 5.009 crashes when updated new FFDB has different size from the old one.

579018

IPS engine 5.030 signal 14 alarm clock crash at nturbo_on_event.

IPsec VPN

Bug ID

Description

449212 New dialup IPsec tunnel in policy mode/mode-cfg overwrites previously established tunnel.
537450 Site-to-site VPN policy based with DDNS destination fail to connect.
553759 ESP packets are sent to the wrong MAC after a routing change when IPsec SA is offloaded.
558693 FWF-90D VPN becomes unresponsive after changing VPN DDNS/Monitor.
559180 The command include-local-lan gets disabled after firewall is rebooted.
560223 Add support for EdDSA certificates for proxy-based deep-inspection / virtual-server when using TLS 1.3. This is resolved by: 0560223, 0561319, 0561820, 0561821, 0561822, 0561823, 0564510.
564237 After configuring SD-WAN and creating SD-WAN rule based on bandwidth criteria, the bandwidth value for tunnel interface is not calculated correctly.

566456

When ipsec phase1-interface name length is 15 (maximum), in dynamic mode with net-device disabled, the client should be able to dial in.

569586 IPsec certificate based IKEv2 VPNs fail to read out certificate subject as username if ECC certificate is involved.
571209 Traffic over VLAN sub-interface pushed through the IPsec policy based VPN interface.

574115

PKI certificates with OU and/or DC as subject fail for PKI user filters.

575238 Redirected traffic on the same interface (ingress and egress interface are the same) is dropped.
575477 IKED memory leak.

576096

mode-cfg IP is missing from the routing table.

577502

OCVPN cannot register - status 'Undefined'.

Log & Report

Bug ID

Description

387294 Country flags in Botnet C&C table and Top Destinations by Bandwidth table are all missing.
545948 FortiGate periodically stops sending syslog messages.
551459 srcintf is unknown-0 in traffic log for service DNS when action is IP connection error.
556199 No logs are generated when using local-in policy on ha-mgmt interface.
558702 miglogd not working until sysctl killall miglogd. Reboot does not help.
565216 Memory of miglogd increase and enter conserve mode.
565505 miglogd high CPU utilization.
566843 No log generated when traffic is blocked by setting tunnel-non-http in web proxy.
568795 Specific traffic type is not logged on FortiAnalyzer/memory.

576024

Set sniffer policy to only log logtraffic=utm but many traffic log stats are still generated in disk or FortiAnalyzer.

Proxy

Bug ID

Description

457347 WAD crashes in wad_http_client_body_done when ICAP is enabled.
544414 WAD handles transparent FTP/FTPS traffic.

550056

When SNI is exempt in an SSL profile, and the SNI does not match the CN, the FortiGate closes the session and does not perform deep inspection.

551119

Certificate blocklist not working correctly in proxy mode.

559166 In firmware 6.0.5, WAD CPU usage on all cores reaches 100% in each around 30s.

560893

When strict SNI check is enabled, FortiGate with certificate inspection cannot block session if SNI does not match CN.

562610 FortiGate generates WAD crash wad_mem_malloc.
563154 Can't open a particular web page via explicit proxy with deep inspection and webfilter profile enabled.

566859

In WAD conserve mode 5.6.8, max_blocks value is high on some workers.

567796 WAD constantly crashes every few seconds.
567942 FortiGate cannot block blacklist certificate against TLS 1.3 if the blacklist certificate server address is exempt.
572489 SSL handshake sometimes fail due to FortiGate replying back FIN to client.
573340 WAD causing memory leak.

573721

For FortiGate with client certificate inspect mode, traffic will trigger WAD crash.

573917 Certain web pages time out.

574171

Fail to connect https://drive.google.com by TLS 1.3.

574730 Wildcard URL filter stops working after upgrade.
576852 WAD process crashes in internet_svc_entry_cmp.

579225

FTP proxy traffic is blocked for FSSO guest users.

581865

In Proxy inspection with Application control and certificate inspection, TLS error for certain web pages, in EDGE browser only.

582714

WAD might leak memory during SSL session ticket resumption.

583736

WAD application crashing in v6.2.1.

580770

SSL decryption breaks App store and Google Play store traffic even though both sites are exempted in the decryption profile.

580943

FortiGate blocklist certificate info is not shown in replace message on certificate inspect case in TLS 1.3.

REST API

Bug ID

Description

566837 HTTPSD process crashes when using REST API.
Routing

Bug ID

Description

558979 ECMP-based session with auxiliary session and IPS is not offloaded in reply direction.
559645 Creating static route from GUI should set Dynamic Gateway disabled by default.
560633 OSPF route for AD-VPN tunnel interface flaps.
562159 ADVPN OSPF unable to ping over ADVPN linknet.

565661

SD-WAN interface bandwidth not honoring its parent's interface estimated bandwidth.

567497 FortiGate sends PIM register messages to RP for group 64.0.0.0 about nonexistent sources.
571714 DHCPv6 relay shows no route to host when there are multiple paths to reach it.
573789 OSPF with virtual clustering not learning routes.

576930

Time stamps missing in routing debugs.

578623

Gradual memory increase with full BGP table.

579884

VRF configuration in WWAN interface has no effect after rebooting.

581488

BGP confederation router sending incorrect AS to neighbor-group routers.

584394

VRRP on LAG cannot forward packet after vrrp-virtual-mac is enabled.

630758

When obsolete ISDB ID is used in static route, default route is created after reboot.

SSL VPN

Bug ID

Description

476377

SSL VPN FortiClient login with FAC user FTM two-factor fail because it times out too fast.

478957

SSL VPN web portal login history is not displayed if logs are stored in FortiAnalyzer.

481038

Web application is not loading through SSL VPN portal.

491733

When SSL VPN receives multiple HTTPS post requests under web filter, read_request_data_f loops even when client is stopped, which causes the SSL VPN process to use 99% of CPU.

496584

SSL VPN bad password attempt causes excessive bind requests against LDAP and lockout of accounts.

515889

SSL VPN web mode has trouble loading internal web application.

525172

A web application accessed through SSL VPN web mode triggers Error 500 on Java server.

530509

Invalid HTTP Request when SMB via SSL VPN bookmark is executed with MS Server 2016, but works fine with MS server 2008R2.

531848

FortiSIEM web GUI does not load on web portal.

537341

SSL bookmark is not loading SAP portal information.

545177

Web mode fails for SharePoint page.

549654

Citrix bookmarks should be disabled in SSL VPN portal.

549994

SSL VPN web mode logon page should not show Skip button for remote user with Force password change on next logon.

551695

Office365 applications through SSL VPN bookmarks.

555344

Downloading PDF file through SSL VPN portal.

555611

SSL VPN web mode web forward not working for video camera system after upgrade to 6.0.4.

558076

In firmware 6.2.0, RDWeb (Windows Server 2016) via SSL web portal does not work.

558080

McAfee ESM 11 display issues in SSL VPN web portal.

558473

For FG-200E, after upgrading from 6.0.4 to 6.2.0, SSL VPN HTTPS bBookmark does not load (Secure Connection Failed).

559171

With SSL VPN web mode unable to get dropdown menu from internal web page.

559785

FortiMail login page with SSL VPN portal not displaying correctly.

560438

interface subnet object not available in SSL VPN split-tunneling-routing-address.

560505

SharePoint 2019 page access fails using web mode.

560730

SSL VPN web mode SSO doesn't work for some site like FAc login.

560747

The referer header is not correct, and some files are not loaded properly.

563147

Connection to internal portal freezes when using SSL VPN web bookmark.

563798

Redirect in bookmark is not loading.

564850

Object from CARL source not showing through SSL VPN web mode.

564871

SSL VPN users create multiple connections.

565675

When using LDAP-integrated certificate authentication, getting connected takes too long. It does not connect until the session expires.

567182

In SSL VPN web mode, videos on internal website won't display.

567626

SSL VPN still allows password expired users to change password and get access.

567628

SSL VPN banned-cipher SHA256 not completely working.

567987

In SSL VPN web mode, RDP disconnects when copying long text from remote to local.

568292

SSL VPN RDP SSO bookmark does not send domain name for domain users.

568481

Internal website using java is not accessed using SSL VPN web mode.

568838

Internal website not working through SSL VPN web mode.

569030

SSL VPN tunnel mode can only add split tunneling of user's policy with groups and its users in different SSL VPN policies.

569711

Error for proxy ssh database through SSL VPN.

570445

CMAT application through SSL VPN not working properly.

570620

SSL VPN web mode does not work properly for the website using JavaScript.

571005

NextCloud through SSL VPN behaving strangely.

571479

Cannot access sub-menus from the internal main website through the bookmark when using SSL VPN web mode.

571721

Local portal adzh-srop-nidm02.intern.cube.ch needs more than 10 min. to load via SSL VPN bookmark.

572653

Unable to access Qlik Sense URL via SSL VPN web mode .

573527

SSL web portal CSP v3 compatibility issue.

573727

Cannot establish SSL VPN connection using FortiClient for macOS when os-check is enabled and action is allow.

573853

TX packet drops on ssl.root interface.

574551

Subpages on internal websites are not working via SSL VPN web mode (Tunnel mode is OK).

574724

In some lower-end FortiGates, the threshold of available memory is not calculated correctly for entering SSL VPN conserve mode. Threshold should be 10% of total memory when the memory is larger than 512 MB and less than 2 GB.

575248

Synology DSM login page is not displayed when accessed via SSL VPN bookmark or connection tool.

575259

SSL VPN connection is being dropped intermittently.

576013

The SSL VPN web mode webserver link is not rewritten correctly after login.

577522

SSL VPN daemon crashes when logging in several times with RADIUS user that is related to a framed IP address.

578581

SSL web mode VPN portal freezing when opening some websites using JavaScript.

580182

The EOASIS website is not displayed properly using SSL VPN web mode.

580384

SSL VPN web mode not redirecting URL as expected after successful login.

581863

Accessing http://nlyte.ote.gr/nlyte/ configured with bookmark name 'NLYTE' not getting authentication page.

582161

Internal web application is not accessible through web SSL VPN.

Switch Controller

Bug ID

Description

557280 Need to add FSW port information on Security Fabric and device inventory the same as before 6.0.4.
563939 802-1X timer reauth-period option 0 doesn't work.
System

Bug ID

Description

423311 200E/201E software switch span function does not work.
470875 OID seems to be COUNTER32 instead of GAUGE32.
498599 Can't create loopback interface by VDOM admin if there's no physical interface in VDOM.
520283 Can't show global setting when VDOM admin run exec tac report command.
531675 SFP ports do not link down when SFP cat5 interface status of FortiGate on the other side goes down.
539970 Kernel panic on HA pair of 301E.
540083 Partial traffic outage with softirq on 100%.

543518

Anti-replay check fails when crossing NP6 with IPS enabled on FG-2500E.

545449 IPinIP traffic over another IPinIP is dropped in NP6-Lite when offloading is enabled.

550091

On a FortiGate trusted by FortiAnalyzer via certificate, the FortiGate loses the connection to FortiAnalyzer if it returns an invalid SN (old FortiAnalyzer VM license or bad FortiAnalyzer certificate).

550206

Memory (SKB) which is no longer needed is not released in NP6 and NP6lite drivers (100E, 140E, 3600D, 3800D).

551281 process_tunnel_timeout_notify:377, send timeout notify message error -1 1 message printed in console.
557172 When there are many application-control based Internet-service entries in SD-WAN, system performance is affected by high CPU usage of softirq.
557527 FortiGate as L2TP client does not negotiate correctly.
557798 High memory utilization caused by authd.
559467 Support four DNS records inside DHCP offer.
560411 3980E unresponsive with millions of sessions in TIME_WAIT.
560686 4x10 G split-port does not work on FG-3700D rev 2.
561097 SD-WAN rule corrupted on reboot after ISDB update.
561234 FG-800D shows wrong HA, ALARM LED status.
561929 REST API cmdb/router/aspath-list is not inserting new values.
562049 TLS 1.3 resumption and Pre-Shared Key (PSK) fail if Hello Retry Request is received.
563232 Authorization fails when 0.0.0.0/0 is listed as the trusted host.
563497 The trust-ip-x feature on interface does not work.
564184 Split DNS not working. CNAME fails to resolve.
564579 Updated crash signal 14, object creation not allowed from cli errno=Resource temporarily unavailable.
564911 DHCPDISCOVERY NATed with TP management IP when sent to NAT VDOM .
565291 SD-WAN rule doesn't work with nested firewall address group selected as source or destination.
565296 Wrong configuration transmitted by FOS to FortiManager under certain conditions.
565631 DHCP relay sessions are removed from the session table after applying any config change.

566615

Sometimes FG-5001E image is not able to sync with the 5913C blade.

567487

CPU goes to 100% when modifying members of an addrgrp object.

567504 Speed test break the cluster.
568215 Kernel bug at net/core/skbuff.

568451

Add support for # character in SNMP community name.

569652 High memory utilization after FortiOS and IPS engine upgrade.
570227 FortiGate is not selecting an NTP server that has a clock time in the majority clique of other NTP servers.

570575

PoE ports no longer deliver power.

570834 STP (spanning tree) flapping.
571207 DHCP with manual address does not provide subnetmask in DHCP ACK.

571720

Using DHCP to acquire addresses for mode-config with certificates fails to send DHCP request.

572411 Timezone for Canary Islands is missing.
572428 lldptx - Application Crashed - Signal 11 Segmentation Fault.

572539

Dnsproxy is killed every 2 seconds and has crash error.

572706

With LLDP, FortiGate serial number is sent in plain text.

572707 Configuration is corrupted when restoring a VDOM.
572763 softirq causing high CPU when session increase in an acceptable way.

573177

GUI cannot save edits made on replacement messages in a VDOM. When using CLI, user gets logged out while editing.

574086 Kernel panic occurs after upgrading from 6.2.0 to 6.2.1.
574110 When adding admin down interface as a member of aggregate interface, it shows up and process the traffic.

574327

FortiGate CSR traffic to SCEP srv generated from the root VDOM instead of the VDOM we create the CSR.

574991

FortiGate can't extract the user principal name UPN from user certificate when certificate contains UPN and additional names.

576063 Crash log keeps having cid could not load sigs after FortiGate is authed into FortiManager.

577047

FortiGate takes a long time to reboot when it has many firewall addresses used in many policies.

577302 Virtual WAN Link process (vwl) memory usage keeps increasing after upgrading to 6.2.1.

578531

forticldd deamon resolved mgrctrl1.fortinet.com to wrong IP address.

578746

FortiGate does not accept FortiManager created country code and causes address install fails.

579524 DHCP lease is not stable and dhcpd process crashes.

580185

authd4 crashes when deleting a VDOM or rebooting the FortiGate.

580883

DNS servers acquired via PPPoE in non-management VDOMs are used for DHCP DNS server option 6.

582547

fgfmsd crash makes connection to FortiManager go down.

Upgrade

Bug ID

Description

550410 Cannot edit addrgrp which includes wildcardfqdn object after upgrade from v5.6.x.
556002 Some firewall policies were deleted after upgrade from FOS 6.0.4 to FOS 6.2.0.
558995 L2 WCCP stops working after upgrade to FOS 6.0.3 or newer.
562444 The firewall policy with internet-service enabled was lost after upgrade from 6.0.5.

580450

Policies removed after an upgrade in NGFW Policy Mode: maximum number of entries has been reached.

586123

Service group lost default members when restoring a configuration file via VDOM.

User & Device

Bug ID

Description

547657 Guest portal RADIUS authentication failure due to FortiAuthenticator trying to resolve third-party websites as access points.
549394 fnbamd crashes frequently.

557947

Non-RSSO RADIUS server shows in FSSO GUI, which should only show RSSO RADIUS servers.

558332 CoA from FAC is not working for FortiGate wired interface based captive portal.

561235

FQDN address objects resolution is failing when used in the captive web portal as walled garden rules.

561289 User-based Kerberos Authentication not working in new VDOM.
561610 src-vis process memory leak.
562185 Disclaimer redirection to IP instead of FQDN results in Certificate/SSL warning.
562861 RADIUS CoA (disconnect request) not working with use-management-vdom.
567990 Hard-timeout setting not working for captive portal.

572645

Importing PKCS #12 certificate files on the System > Certificates page does not work (CLI works).

575096

Copying and pasting the local certificate and private key in the FortiGate terminal session no longer works.

581519

Creating SCEP enrollment in context global no longer seems to work if VDOM is configured as the management VDOM.

VM

Bug ID

Description

524052

Application cloudinitd has signal 11 crash on FortiGate-VM64-GCP.

561083

VPN tunnels not coming up after HA failover in GCP.

561909

Azure SDN connector try querying invalid FQDN when using Azure Stack Integrated systems.

567137

VM in Oracle cloud has 100% CPU usage in system space.

569643

Kernel crashes when IPsec traffic is handled by the QAT device.

570176

HA cluster multi AZ does not failover IPsec VPN in AWS with TGW.

571652

OCI SDN connector gets HTTP response err:500 when enabling use-metadata-iam.

572039

EMAC VLAN is not supported on VM.

573952

FGT-VM with network driver vmxnet3 has lots of fragments when testing throughput.

575400

In Azure SDN, the firewall address filter cannot fetch the secondary public and private IP addresses of the NICs.

578727

FGTVM_OPC unable to failover the route properly during failover.

578966

OpenStack PCI passthrough sub interface VLAN cannot received traffic.

580738

In the Cluster setup, secondary unit can have different fingerprint for the OCI SDN connector, which can cause unit to fail to connect to OCI metatdata server properly.

580911

EIP assigned to the secondary IP address on the OCI do not 't fail over during HA failover.

577856

Add missing AWS HA failover error log and set firewall.vip/vip46/vip6/vip64 not sync'ing when cross zone HA is configured.

VoIP

Bug ID

Description

570430

SIP ALG generates a VoIP session with wrong direction.

580588

SDP information fields are not being NATted in Multipart Media Encapsulation traffic.

WAN Optimization

Bug ID

Description

564290

FortiOS cannot collaborate web cache with FortiProxy successfully.

Web Filter

Bug ID

Description

356487

When central-management is NONE, include-default-servers setting is not honored by rating.

549928

Block page images not loading for web sites protected by HSTS.

553593

CLI diagnose debug urlfilter test-url <url> response is URL test cache miss even though the test-url is in the web filter rating cache.

565952

Proxy-based web filter breaks WCCP traffic.

584898

FortiGuard flow web filter cannot block TLS 1.3 website under certificate inspection.

WiFi Controller

Bug ID

Description

540027

FortiWiFi working as client mode cannot see and connect to the hotspot SSID from iOS devices.

559370

darrp-optimize-schedules configurations move to the global settings instead of VDOM.

560828

When the NGFW mode is set to policy-based, FortiAPs cannot be managed when dtls-policy is ipsec-vpn.

569966

WPA2-Enterprise SSID authentication cannot utilize the source IP setting in RADIUS server configuration.

570745

FAPs detecting BSSIDs of others FAPs managed by the same WC as Fake-ap-on-air.

573024

FAP cannot be managed by FortiGate when admin trusthost is configured.

577394

hostapd (wpad_ac) crashed while removing RADIUS accounting servers.

579908

Tunnel mode SSID packet loss seen from FAP-U24JEV and 800 connected APs.

580793

Auto-generated consolidated policy should skip saving in configuration file/CMDB.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID

CVE references

551549

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-9494
  • CVE-2019-9495

565708

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-6696

567521

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-6697

569310

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-15703

577643

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-15706

578626

FortiOS 6.2.2 is no longer vulnerable to the following CVE Reference:

  • CVE-2019-15705