Fortinet black logo

Known issues

Known issues

The following issues have been identified in Hyperscale firewall for FortiOS 6.2.7 Build 7105. For inquires about a particular bug, please contact Customer Service & Support. The Known issues described in the FortiOS 6.2.7 release notes also apply to Hyperscale firewall for FortiOS 6.2.7 Build 7105.

Bug ID

Description

669645

VXLAN interfaces cannot be added to a hardware switch interface.

678318

Apply NP7 acceleration to inter-VDOM link traffic by creating inter-VDOM links with the type set to npupair. For example:

config system vdom-link

edit <name>

set type npupair

end

692021

Only one hardware session synch interface can be configured in an HA configuration.

701987

The NP7 hyperscale firewall packet sniffer (diagnose npu sniffer) does not work for IPv4 or IPv6 VPN tunnel interfaces.

703667 FGCP HA hardware session synchronization may not synchronize all hyperscale firewall sessions to the backup FortiGate if the hyperscale firewall session includes one or more overload IP pools. The session loss rate on the backup FortiGate depends on the percentage of resource retries during session setup. The more IP pool resources that are available, the lower the loss rate.
704851

The config system session-ttl command is a VDOM command, configured from a VDOM. However, options set by this command apply to all CGNAT VDOMs and not just the VDOM in which they are set.

706696

SNMP UDP traffic passing through a FortiGate is intimidatingly dropped when NP7 hardware acceleration is enabled .

707729

In some cases a temporary performance reduction occurs when changing the firewall configuration or running some diagnose commands on a FortiGate under high traffic load.

709110

During startup, there may be a delay as various processes start up before sessions can be sent to the NP7 processors. Sessions received during this delay that would normally be NP7 sessions may be processed by the CPU.

709890

In some cases, SIP data sessions may be unexpectedly offloaded to NP7 processors.

710083

If the udp-idle-timer is set to a relatively high value, a FortiGate may enter into conserve mode from running lower than expected amounts of SIP traffic.

710232 HPE functionality is limited in this release. For details, see HPE limitations.

711135

711462

714800

716766

718059

Various HA-related issues can cause minor performance reductions or unexpected behavior.

714915

Changing the configuration of a hardware log server group assigned to a hyperscale firewall policy that is processing traffic may cause sessions accepted by the firewall policy to be dropped.

715532

Due to an index limit, a FortiGate may not be able to manage a FortiSwitch if the FortiGate is licensed for 500 VDOMs and you have created a large number of VDOMs (for example, over 300).

716169

SPF interfaces with speed set to 1000full will remain down after the system restarts.

716245

In the hyperscale firewall policy list, the GUI does not accurately display the number of bytes or packets processed by the explicit deny policy.

716424

The NPD process crashes if a FortiGate is under relatively high traffic load and the configuration includes the maximum number of hyperscale firewall policies, as defined in the maximum values, in multiple VDOMs.

717011

In some cases, SIP ALG traffic can cause PBA leaks and deadlocks.

717071

While editing a hyperscale firewall policy, if you edit the IP pool configuration added to the policy and enable overload, the Endpoint Independent Mapping option in the firewall policy incorrectly remains visible. Endpoint Independent Mapping is not supported for hyperscale firewall policies with overload IP pools.

717304

Time displayed by the real time clock may drift and become inaccurate. You can work around this issue by enabling NTP.

717621

In some cases, in a FortiGate with multiple NP7s one of the NP7 processors can appear to be much busier than the others.

718356

In some cases, BGP prefixes are not cleared from the routing table used by NP7 processors after they have been removed from the kernel because the peer they point to has gone down.

718373

It may take more time than expected to install BGP prefixes in the routing table used by NP7 processors. During the delay the GUI and CLI may not be accessible.

718429

SIP RTCP sessions accepted by hyperscale firewall policies may not be offloaded to NP7 processors.

718442 SNMP queries for NAT64 session counts may not return any data.

718713

An interface that is configured to drop fragmented packets (drop-fragment set to enable) may still forward fragmented packets.

718886

In some cases, when the SIP session helper is enabled, some SIP traffic is offloaded to NP7 processors. SIP traffic should not be offloaded if the SIP session helper is enabled.

725975

Hyperscale firewall policy usage statistics are not displayed on the GUI when editing the policy.

740225

In hyperscale VDOMs, traffic may be blocked by NP7 processors if the firewall policy that accepts the traffic includes address groups with ten or more firewall addresses if one or more of the firewall addresses in the address group matches a single IP address. You can workaround this problem by removing the firewall addresses from the address group that match a single IP address and adding these firewall addresses directly to the firewall policy. After making the configuration change, you should restart the FortiGate.

Known issues

The following issues have been identified in Hyperscale firewall for FortiOS 6.2.7 Build 7105. For inquires about a particular bug, please contact Customer Service & Support. The Known issues described in the FortiOS 6.2.7 release notes also apply to Hyperscale firewall for FortiOS 6.2.7 Build 7105.

Bug ID

Description

669645

VXLAN interfaces cannot be added to a hardware switch interface.

678318

Apply NP7 acceleration to inter-VDOM link traffic by creating inter-VDOM links with the type set to npupair. For example:

config system vdom-link

edit <name>

set type npupair

end

692021

Only one hardware session synch interface can be configured in an HA configuration.

701987

The NP7 hyperscale firewall packet sniffer (diagnose npu sniffer) does not work for IPv4 or IPv6 VPN tunnel interfaces.

703667 FGCP HA hardware session synchronization may not synchronize all hyperscale firewall sessions to the backup FortiGate if the hyperscale firewall session includes one or more overload IP pools. The session loss rate on the backup FortiGate depends on the percentage of resource retries during session setup. The more IP pool resources that are available, the lower the loss rate.
704851

The config system session-ttl command is a VDOM command, configured from a VDOM. However, options set by this command apply to all CGNAT VDOMs and not just the VDOM in which they are set.

706696

SNMP UDP traffic passing through a FortiGate is intimidatingly dropped when NP7 hardware acceleration is enabled .

707729

In some cases a temporary performance reduction occurs when changing the firewall configuration or running some diagnose commands on a FortiGate under high traffic load.

709110

During startup, there may be a delay as various processes start up before sessions can be sent to the NP7 processors. Sessions received during this delay that would normally be NP7 sessions may be processed by the CPU.

709890

In some cases, SIP data sessions may be unexpectedly offloaded to NP7 processors.

710083

If the udp-idle-timer is set to a relatively high value, a FortiGate may enter into conserve mode from running lower than expected amounts of SIP traffic.

710232 HPE functionality is limited in this release. For details, see HPE limitations.

711135

711462

714800

716766

718059

Various HA-related issues can cause minor performance reductions or unexpected behavior.

714915

Changing the configuration of a hardware log server group assigned to a hyperscale firewall policy that is processing traffic may cause sessions accepted by the firewall policy to be dropped.

715532

Due to an index limit, a FortiGate may not be able to manage a FortiSwitch if the FortiGate is licensed for 500 VDOMs and you have created a large number of VDOMs (for example, over 300).

716169

SPF interfaces with speed set to 1000full will remain down after the system restarts.

716245

In the hyperscale firewall policy list, the GUI does not accurately display the number of bytes or packets processed by the explicit deny policy.

716424

The NPD process crashes if a FortiGate is under relatively high traffic load and the configuration includes the maximum number of hyperscale firewall policies, as defined in the maximum values, in multiple VDOMs.

717011

In some cases, SIP ALG traffic can cause PBA leaks and deadlocks.

717071

While editing a hyperscale firewall policy, if you edit the IP pool configuration added to the policy and enable overload, the Endpoint Independent Mapping option in the firewall policy incorrectly remains visible. Endpoint Independent Mapping is not supported for hyperscale firewall policies with overload IP pools.

717304

Time displayed by the real time clock may drift and become inaccurate. You can work around this issue by enabling NTP.

717621

In some cases, in a FortiGate with multiple NP7s one of the NP7 processors can appear to be much busier than the others.

718356

In some cases, BGP prefixes are not cleared from the routing table used by NP7 processors after they have been removed from the kernel because the peer they point to has gone down.

718373

It may take more time than expected to install BGP prefixes in the routing table used by NP7 processors. During the delay the GUI and CLI may not be accessible.

718429

SIP RTCP sessions accepted by hyperscale firewall policies may not be offloaded to NP7 processors.

718442 SNMP queries for NAT64 session counts may not return any data.

718713

An interface that is configured to drop fragmented packets (drop-fragment set to enable) may still forward fragmented packets.

718886

In some cases, when the SIP session helper is enabled, some SIP traffic is offloaded to NP7 processors. SIP traffic should not be offloaded if the SIP session helper is enabled.

725975

Hyperscale firewall policy usage statistics are not displayed on the GUI when editing the policy.

740225

In hyperscale VDOMs, traffic may be blocked by NP7 processors if the firewall policy that accepts the traffic includes address groups with ten or more firewall addresses if one or more of the firewall addresses in the address group matches a single IP address. You can workaround this problem by removing the firewall addresses from the address group that match a single IP address and adding these firewall addresses directly to the firewall policy. After making the configuration change, you should restart the FortiGate.