Fortinet white logo
Fortinet white logo

Known issues

Known issues

The following issues have been identified in version 6.4.0. To inquire about a particular bug or report a bug, please contact Customer Service & Support.

Anti Virus

Bug ID

Description

702646 Re-enable JavaScript heuristic detection and fix detection blocking content despite low rating.

Application Control

Bug ID

Description

787130 Application control does not block FTP traffic on an explicit proxy.

DNS Filter

Bug ID

Description

692482

DNS filter forwards the DNS status code 1 FormErr as status code 2 ServFail in cases where the redirect server responses have no question section.

796052

If local-in and transparent requests are hashed into the same local ID list, when the DNS proxy receives a response, it finds the wrong query for requests with the same ID and domain.

Explicit Proxy

Bug ID

Description

664380

When configuring explicit proxy with forward server, if ssl-ssh-profile is enabled in proxy-policy, WAD is unable to correctly learn the destination type correctly, so the destination port is set to 0, but the squid proxy server does not accept the request and returns an error.

755298

SNI ssl-exempt result conflicts with CN ssl-exempt result when SNI is an IP.

765761

Firewall with forward proxy and UTM enabled is sending TLS probe with forward proxy IP instead of real server IP.

778339

Improve logic of removing HTTP Proxy-Authorization/Authorization header to prevent user credential leaking.

780211

diagnose wad stats policy list output displays information for only 20 proxy policies, so not all policies are included.

File Filter

Bug ID

Description

626652

The unknown and bin file types catch too many random files, which leads to inconsistent results for web traffic.

Firewall

Bug ID

Description

622045

Traffic not matched by security policy when using service groups in NGFW policy mode.

622258

Move command does not work for firewall service category.

635074

Firewall policy dstaddr does not show virtual server available based on virtual WAN link member.

644638

Policy with a Tor exit node as the source is not blocking traffic coming from Tor.

767226

When a policy denies traffic for a VIP and send-deny-packet is enabled, the mappedip is used for the RST packet's source IP instead of the external IP.

770668

The packet dropped counter is not incremented for per-ip-shaper with max-concurrent-session as the only criterion and offload disabled on the firewall policy.

773035

Custom services name is not displayed correctly in logs with a port range of more than 3000 ports.

791735

The number of sessions in session_count does not match the output from diagnose sys session full-stat.

803270

Unexpected value for session_count appears.

FortiView

Bug ID

Description

615524

FortiView > All Sessions should be supported as a standalone dashboard widget in navigation bar.

643198

Threats drilldown for Sources, Destinations, and Country/Region (1 hour, 24 hours, 7 days) gives the error, Failed to retrieve FortiView data.

692734

When using the 5 minutes time period, if the FortiGate system time is 40 to 59 second behind the browser time, no data is retrieved.

GUI

Bug ID

Description

473841

Newly created deny policy incorrectly has logging disabled and can not be enabled when the CSF is enabled.

528145

BGP configuration gets applied on the wrong VDOM if user switches VDOM selection in between operations (slow GUI).

564849

HA warning message remains after primary device takes back control.

602102

Warning message is not displayed when a user configures an interface with a static IP address that is already in use.

602397

Managed FortiSwitch and FortiSwitch Ports pages are slow to load when there are many managed FortiSwitches. This performance issue needs a fix on both FortiOS and FortiSwitch. A fix was provided in FortiOS 7.0.1 and FortiSwitch 7.0.1.

622510

Page is stuck and there is a blank message field when doing policy lookup with non-IP protocol.

624551

On POE devices, several sections of the GUI take over 15 seconds to fully load.

628373

Software switch members and their VLANs are not visible in the GUI interfaces list.

630216

A user can browse HA secondary logs in the GUI, but when a user downloads these logs, it is the primary FortiGate logs instead.

631734

GUI not displaying PoE total power budget on FOS 6.2.3.

634677

User group not visible in GUI when editing the user with a single right-click.

663558

Log Details under Log & Report > Events displays the wrong IP address when an administrative user logs in to the web console.

689605

On some browser versions, the GUI displays a blank dialog when creating custom application or IPS signatures. Affected browsers: Firefox 85.0, Microsoft Edge 88.0, and Chrome 88.0.

713529

When a FortiGate is managed by FortiManager with FortiWLM configured, the HTTPS daemon may crash while processing some FortiWLM API requests. There is no apparent impact on the GUI operation.

734773

On the System > HA page, when vCluster is enabled and the management VDOM is not the root VDOM, the GUI incorrectly displays management VDOM as primary VDOM.

735248

On a mobile phone, the WiFi captive portal may take longer to load when the default firewall authentication login template is used and the user authentication type is set to HTTP.

739827

On FG-VM64-AZURE, administrator is logged out every few seconds, and the following message appears in the browser: Some cookies are misusing the recommended "SameSite" attribute.

746953

On the Network > Interfaces page, users cannot modify the TFTP server setting. A warning with the message This option may not function correctly. It is already configured using the CLI attribute: tftp-server. appears beside the DHCP Options entry.

Workaround: use the CLI.

749451

On the Network > SD-WAN page, the volume sent/received displayed in the charts does not match the values provided from the REST API when the RX and TX values of diagnose sys sdwan intf-sla-log exceed 232-1.

763925

GUI shows user as expired after entering a comment in guest management.

787565

When logged in as guest management administrator, the custom image shows as empty on the user information printout.

Workaround: use the regular Guest Management page.

792045

FortiGate failed to view matched endpoints after viewing it successfully several times.

HA

Bug ID

Description

662978

Long lasting sessions are expired on HA secondary device with a 10G interface.

683584

The hasync process crashed because the write buffer offset is not validated before using it.

683628

The hasync process crashes often with signal 11 in cases when a CMDB mind map file is deleted and some processes still mind map the old file.

717785

HA primary does not send anti-spam and outbreak prevention license information to the secondary.

750829

In large customer configurations, some functions may time out, which causes an unexpected failover and keeps high cmdbsvr usage for a long time.

751072

HA secondary is consistently unable to synchronize any sessions from the HA primary when the original HA primary returns.

752928

fnbamd uses ha-mgmt-interface for certificate related DNS queries when ha-direct is enabled.

754599

SCTP sessions are not fully synchronized between nodes in FGSP.

760562

hasync crashes when the size of hasync statistics packets is invalid.

763214

Firmware upgrade fails when the bandwidth between hbdev is reduced to 26 Mbps and lower (Check image file integrity error!).

764873

FGSP cluster with UTM does not forward UDP or ICMP packets to the session owner.

765619

HA desynchronizes after user from a read-only administrator group logs in.

766842

Long wait and timeout when upgrading FG- 3000D HA cluster due to vluster2 being enabled.

771389

SNMP community name with one extra character at the end stills matches when HA is enabled.

779512

If the interface name is a number, an error occurs when that number is used as an hbdev priority.

782769

Unable to form HA pair when HA encryption is enabled.

785514

In some situations, the fgfmd daemon is blocked by a query to the HA secondary checksum, which causes the tunnel between the FortiManager and FortiGate to go down.

786592

Failure in self-pinging towards the management IP.

794707

Get invalid IP address when creating a firewall object in the CLI; it synchronized to the secondary in FGSP standalone-config-sync.

801872

Unexpected HA failover on AWS A-P cluster when ipsec-soft-dec-async is enabled.

803697

The ha-mgmt-interface stops using the configured gateway6.

Intrusion Prevention

Bug ID

Description

622741

Traffic was blocked during the test with flow UTMs enabled.

698247

Flow mode web filter ovrd crashes and socket leaks in IPS daemon.

699775

Fortinet logo is missing on web filter block page in Chrome.

713508

Low download performance occurs when SSL deep Inspection is enabled on aggregate and VLAN interfaces when nTurbo is enabled.

739272

Users cannot visit websites with an explicit web proxy when the FortiGate enters conserve mode with fail-open disabled. Block pages appear with the replacement message, IPS Sensor Triggered!.

IPsec VPN

Bug ID

Description

622506 L2TP over IPsec tunnel established, but traffic cannot pass because wrong interface gets in route lookup.

623238

ADVPN shortcut cannot be established if both spokes are behind NAT.

771935

Offloaded transit ESP is dropped in one direction until session is not deleted.

773313

FG-40F-3G4G with WWAN DHCP interface set as L2TP client shows drops in WWAN connections and does not get the WWAN IP.

777476

When FGCP and FGSP is configured, but the FGCP cluster is not connected, IKE will ignore the resync event to synchronize SA data to the FGSP peer.

781403

IKE is consuming excessive memory.

786409

Tunnel had one-way traffic after iked crashed.

Log & Report

Bug ID

Description

621329

Mixed traffic and UTM logs are in the event log file because the current category in the log packet header is not big enough.

702859

Outdated report files deleted system event log keeps being generated.

708890

Traffic log of ZTNA HTTPS proxy and TCP forwarding is missing policy name and FortiClient ID.

726231

The default logtraffic setting (UTM) in a security policy unexpectedly generates a traffic log.

753904

The reportd process consumes a high amount of CPU.

764478

Logs are missing on FortiGate Cloud from the FortiGate.

768626

FortiGate does not send WELF (WebTrends Enhanced Log Format) logs.

769300

Traffic denied by security policy (NGFW policy-based mode) is shown as action="accept" in the traffic log.

774767

The expected reboot log is missing.

776929

When submitting files for sandbox logging in flow mode, filetype="unknown" is displayed for PDF, DOC, JS, RTF, ZIP, and RAR files.

Proxy

Bug ID

Description

604681

WAD process with SoC SSL acceleration enabled consumes more memory usage over time, which may lead to conserve mode.

Workaround: disable SoC SSL acceleration under the firewall SSL settings.

619637

In transparent proxy policy with authentication on corporate firewall, it shows Access Denied after authentication.

621787

On some smaller models, WAD watchdog times out when there is a lot of SSL traffic.

623213

Firewall does not handle 308 redirects properly for threat feed list.

624245

WAD crashes when all of these conditions are met: policy is doing deep inspection, SNI in client hello is in the exempt list, server certificate CNAME is not in the exempt list.

636508

FortiGate blocks traffic in transparent proxy policy, even if the traffic matches the proxy address.

678815

WAD crashes with signal 11 if the client sends a client hello containing a key share that does not match the key share that the server prefers.

717995

Proxy mode generates untagged traffic in a virtual wire pair.

747915

Deep inspection of SMTPS and POP3S starts to fail after restoring the configuration file of another device with the same model.

755685

Trend Micro client results in FortiGate illegal parameter SSL alert response because the Trend Micro client sent a ClientHello that includes extra data, which is declined by the FortiGate according to RFC 5246 7.4.1.2.

791662

FortiGate is silently dropping server hello in TLS negotiation.

802935

FortiGate cannot block a virus file when using the HTTP PATCH upload method.

803260

Memory increase suddenly and is not released until rebooting.

Routing

Bug ID

Description

580207

Policy route does not apply to local-out traffic.

618100

Link health monitor with HTTP/TCP echo cannot send out probe packets in the setting interval when the server is unreachable.

626549

SD-WAN rules created using ISDB do not match/forward via the correct interface.

666829

Application bfdd crashes.

717086

External resource local out traffic does not follow the SD-WAN rule and specified egress interface when the interface-select-method configuration in system external-resource is changed.

724541

One IPv6 BGP neighbor is allowed to be configured with one IPv6 address format and shows a different IPv6 address format.

729621

High CPU on hub BGPD due to hub FortiGate being unable to maintain BGP connections with more than 1K branches when route-reflector is enabled.

730194

742648

When syncing a large number of service qualities, there is a chance of accessing out-of-boundary memory, which causes the VWL daemon to crash.

745856

The default SD-WAN route for the LTE wwan interface is not created.

Workaround: add a random gateway to the wwan member.

config system sdwan
    config members
        edit 2
            set interface "wwan"
            set gateway 10.198.58.58
            set priority 100
        next
    end
end

756955

Routing table does not reflect the new changes for the static route until the routing process is restarted when cmdbsrv and other processes take CPU resources upon every configuration change in devices with over ten thousand firewall policies.

759752

FortiGate is sending malformed packets causing a BGP IPv6 peering flap when there is a large amount of IPv6 routes, and they cannot fit in one packet.

762258

When policy-based routing uses a PPPoE interface, the policy route order changes after rebooting and when the link is up/down.

771052

The set next-hop-self-rr6 enable parameter not effective.

778392

Kernel panic crash occurs after receiving new IPv6 prefix via BGP.

780210

Changing the interface weight under SD-WAN takes longer to be applied from the GUI than the CLI.

Security Fabric

Bug ID

Description

609182

Security Fabric Settings page sometimes cannot load FortiSandbox URL threat detection version despite FortiSandbox being connected.

614691

Slow GUI performance in large Fabric topology with over 50 downstream devices.

623689

CSF branch FortiGate cannot successfully connect/verify certificate with remote EMS server.

690812

FortiGate firewall dynamic address resolution lost when SDN connector updates its cache.

712155

The security rating for Admin Idle Timeout incorrectly fails for a FortiAnalyzer with less than 10 minutes.

718469

Wrong timestamp printed in the event log received in email from event triggered from email alert automation stitch.

724071

Log disk usage from user information history daemon is high and can restrict the use for general logging purposes.

788543

Topology tree shows No connection or Unauthorized for FortiAnalyzer while sending log data to FortiAnalyzer.

789820

The csfd process is causing high memory usage on the FortiGate.

SSL VPN

Bug ID

Description

613111

Traffic cannot pass through FortiGate in SSL VPN web mode if the user is a PKI peer.

613612

Important GUI pages in 6.4.0 are not rendered well by SSL VPN portal.

616429

Local user assigned with FortiToken cannot log in to SSL VPN web/tunnel mode when password change is required.

616879

Traffic cannot pass through FortiGate for SSL VPN web mode if the user is a PKI peer.

619914

Split-tunnel information is not recognized by legacy FortiClient SSL VPN Linux tool.

629373

SAML login button is lost on SSL VPN portal.

637018

After the upgrade to 6.0.10/6.2.4/6.4.0 SSL VPN portal mapping/remote authentication is matching user into the incorrect group.

740378

Windows FortiClient 7.0.1 cannot work with FortiOS 7.0.1 over SSL VPN when the tunnel IP is in the same subnet as one of the outgoing interfaces and NAT is not enabled.

741674

Customer internal website (https://cm***.msc****.com/x***) cannot be rendered in SSL VPN web mode.

745554

Logging in with SSO to FortiAnalyzer with SSL VPN web mode fails.

749857

Web mode and tunnel mode could not reflect the VRF setting, which causes the traffic to not pass through as expected.

756753

FQDN in firewall policy is treated case sensitive, which causes SSL VPN failure when redirecting or accessing a URL that contains capitalized characters.

757726

SSL VPN web portal does not serve updated certificate.

759664

Renaming the server entry configuration will break the connection between the IdP and FortiGate, which causes the SAML login for SSL VPN to not work as expected.

762685

Punycode is not supported in SSL VPN DNS split tunneling.

767869

SCADA portal will not fully load with SSL VPN web bookmark.

771162

Unable to access SSL VPN bookmark in web mode.

772191

Website is not loading in SSL VPN web mode.

774661

Unable to load SSL VPN web portal internal webpage.

774831

Comma character (,) is acting as delimiter in authentication session decoding when CN format is Surname, Name.

781542

Unable to access internal SSL VPN bookmark in web mode.

783508

After upgrading, NLA security mode for SSL VPN web portal bookmark does not work.

786179

Cannot reach local application (dat***.btn.co.id) while using SSL VPN web mode.

801588

After Kronos (third-party) update from 8.1.3 to 8.1.13, SSL VPN web portal users get a blank page after logging in successfully.

Switch Controller

Bug ID

Description

622812

VLANs on a FortiLink interface configured to use a hardware switch interface may fail to come up after upgrading or rebooting.

774848

Bulk MAC addresses deletions on FortiSwitch is randomly causing all wired clients to disconnect at the same time and reconnect.

System

Bug ID

Description

602141

The extender daemon crashes on Low Encryption (LENC) FortiGates.

610900

Low throughput on FG-2201E for traffic with ECN flag enabled.

613136

Uninitialized variable that may potentially cause httpsd signal 6 and 11 crash issue.

617154

Fortinet_CA is missing in FG-3400E.

617409

The FG-800D HA LED is off when HA status is normal.

617453

fgfmsd crash due to REST agent.

636069

Unable to handle kernel NULL pointer dereference at 000000000000008f.

644782

A large number of detected devices causes httpsd to consume resources, and causes low-end devices to enter conserve mode.

679059

The ipmc_sensord process is killed multiple times when the CPU or memory usage is high.

712321

Multiple ports flapping when a single interface is manually brought up. Affected platforms: FG-3810D and FG-3815D.

716250

Incorrect bandwidth utilization traffic widget for VLAN interface based on LACP interface.

717791

execute restore vmlicense tftp fails with tftp: bind: Address already in use.

718307

Verizon LTE connection is not stable, and the connection may drop after a few hours.

738423

Unable to create a hardware switch with no member.

749613

Unable to save configuration changes and get failed: No space left on device error on FG-61E, FG-81E, and FG-101E.

750171

Legitimate traffic is unable to go through with NP6 synproxy enabled.

750533

The cmdbsvr crashes when accessing an invalid firewall vip mapped IP that causes traffic to stop traversing the FortiGate.

751044

There is no sensor trap function and related logs on SoC4 platforms.

751870

User should be disallowed from sending an alert email from a customized address if the email security compliance check fails.

753912

FortiGate calculates faulty FDS weight with DST enabled.

757478

Kernel panic results in reboot due the size of inner Ethernet header and IP header not being checked properly when the SKB is received by the VXLAN interface.

764252

On FG-100F, no event is raised for PSU failure and the diagnostic command is not available.

764483

After restoring the VDOM configuration, Interface <VLAN> not found in the list! is present for VLANs on the aggregate interface.

771267

Zone transfer with FortiGate as primary DNS server fails if the FortiGate has more than 241 DNS entries.

773702

FortiGate running startup configuration is not saved on flash drive.

775529

Hardware switch is not passing VRRP packets.

778116

Restricted VDOM user is able to access the root VDOM.

779523

Negative tunnel_count in diagnose firewall gtp profile list for FGSP peer.

792544

A request is made to the remote authentication server before checking trusthost.

799255

Any configuration changes on FG-2601F causes cmbdr crash with signal 6 and traffic to stop flowing.

801985

Kernel panic occurs when a virtual switch with VLAN is created, and another port is configured with a trunk.

802917

PPPoE virtual tunnel drops traffic after logon credentials are changed.

809366

FG-40F with STP enabled on a hardware switch creates a loop after upgrading.

User & Authentication

Bug ID

Description

605437

FortiOS does not understand CMPv2 grantedWithMods response.

667150

Add GUI support for FortiToken Mobile push notification and FortiToken Cloud based on two-factor authentication, which is already supported by authd.

756763

In the email collection captive portal, a user can click Continue without selecting the checkbox to accept the terms and disclaimer agreement.

777004

Local users named pop or map do not work as expected when trying to add then as sources in a firewall policy.

VM

Bug ID

Description

622031

azd keeps crashing if Azure VM contains more than 15 tags.

623376

Multi zone HA breaks after upgrading to 6.4.0 because upgrade process does not add relevant items under VDOM exception.

721439

Problems occur when switching between HA broadcast heartbeat to unicast heartbeat and vice versa.

734148

The vmtoolsd and openvmtools processes are using a high amount of memory.

750889

DHCP relay fails when VMs on different VLAN interfaces use the same transaction ID.

781879

FortiFlex license activation failed to be applied to FortiGate VM in HA. Standalone mode is OK.

799536

Data partition is almost full on FG-VM64 platforms.

VoIP

Bug ID

Description

794517

VoIP daemon memory leak occurs when the following conditions are met:

  • The SIP call is on top of the IPsec tunnel.
  • The call fails before the setup completes (session gets closed in a state earlier than VOIP_SESSION_STATE_RUNNING).

Web Filter

Bug ID

Description

621807, 625897

Filtering Services Availability status is down on the GUI when HTTP/80 is used for web filtering rating service.

654160

Web filter profile count decreased after upgrading to 6.4.0 on FG-100F.

801792

IPS daemon has socket FD leaks.

WiFi Controller

Bug ID

Description

783209

The arrp-profile table cannot be purged if no entry is in use.

790367

FWF-60F has kernel panic and reboots by itself every few hours.

791761

CAPWAP tunnel traffic over WPA2-Enterprise SSID is dropped when offloading is enabled on FG-1800F.

801259

CLI script from FortiManager with two commands fails, but succeeds with one command.

Known issues

Known issues

The following issues have been identified in version 6.4.0. To inquire about a particular bug or report a bug, please contact Customer Service & Support.

Anti Virus

Bug ID

Description

702646 Re-enable JavaScript heuristic detection and fix detection blocking content despite low rating.

Application Control

Bug ID

Description

787130 Application control does not block FTP traffic on an explicit proxy.

DNS Filter

Bug ID

Description

692482

DNS filter forwards the DNS status code 1 FormErr as status code 2 ServFail in cases where the redirect server responses have no question section.

796052

If local-in and transparent requests are hashed into the same local ID list, when the DNS proxy receives a response, it finds the wrong query for requests with the same ID and domain.

Explicit Proxy

Bug ID

Description

664380

When configuring explicit proxy with forward server, if ssl-ssh-profile is enabled in proxy-policy, WAD is unable to correctly learn the destination type correctly, so the destination port is set to 0, but the squid proxy server does not accept the request and returns an error.

755298

SNI ssl-exempt result conflicts with CN ssl-exempt result when SNI is an IP.

765761

Firewall with forward proxy and UTM enabled is sending TLS probe with forward proxy IP instead of real server IP.

778339

Improve logic of removing HTTP Proxy-Authorization/Authorization header to prevent user credential leaking.

780211

diagnose wad stats policy list output displays information for only 20 proxy policies, so not all policies are included.

File Filter

Bug ID

Description

626652

The unknown and bin file types catch too many random files, which leads to inconsistent results for web traffic.

Firewall

Bug ID

Description

622045

Traffic not matched by security policy when using service groups in NGFW policy mode.

622258

Move command does not work for firewall service category.

635074

Firewall policy dstaddr does not show virtual server available based on virtual WAN link member.

644638

Policy with a Tor exit node as the source is not blocking traffic coming from Tor.

767226

When a policy denies traffic for a VIP and send-deny-packet is enabled, the mappedip is used for the RST packet's source IP instead of the external IP.

770668

The packet dropped counter is not incremented for per-ip-shaper with max-concurrent-session as the only criterion and offload disabled on the firewall policy.

773035

Custom services name is not displayed correctly in logs with a port range of more than 3000 ports.

791735

The number of sessions in session_count does not match the output from diagnose sys session full-stat.

803270

Unexpected value for session_count appears.

FortiView

Bug ID

Description

615524

FortiView > All Sessions should be supported as a standalone dashboard widget in navigation bar.

643198

Threats drilldown for Sources, Destinations, and Country/Region (1 hour, 24 hours, 7 days) gives the error, Failed to retrieve FortiView data.

692734

When using the 5 minutes time period, if the FortiGate system time is 40 to 59 second behind the browser time, no data is retrieved.

GUI

Bug ID

Description

473841

Newly created deny policy incorrectly has logging disabled and can not be enabled when the CSF is enabled.

528145

BGP configuration gets applied on the wrong VDOM if user switches VDOM selection in between operations (slow GUI).

564849

HA warning message remains after primary device takes back control.

602102

Warning message is not displayed when a user configures an interface with a static IP address that is already in use.

602397

Managed FortiSwitch and FortiSwitch Ports pages are slow to load when there are many managed FortiSwitches. This performance issue needs a fix on both FortiOS and FortiSwitch. A fix was provided in FortiOS 7.0.1 and FortiSwitch 7.0.1.

622510

Page is stuck and there is a blank message field when doing policy lookup with non-IP protocol.

624551

On POE devices, several sections of the GUI take over 15 seconds to fully load.

628373

Software switch members and their VLANs are not visible in the GUI interfaces list.

630216

A user can browse HA secondary logs in the GUI, but when a user downloads these logs, it is the primary FortiGate logs instead.

631734

GUI not displaying PoE total power budget on FOS 6.2.3.

634677

User group not visible in GUI when editing the user with a single right-click.

663558

Log Details under Log & Report > Events displays the wrong IP address when an administrative user logs in to the web console.

689605

On some browser versions, the GUI displays a blank dialog when creating custom application or IPS signatures. Affected browsers: Firefox 85.0, Microsoft Edge 88.0, and Chrome 88.0.

713529

When a FortiGate is managed by FortiManager with FortiWLM configured, the HTTPS daemon may crash while processing some FortiWLM API requests. There is no apparent impact on the GUI operation.

734773

On the System > HA page, when vCluster is enabled and the management VDOM is not the root VDOM, the GUI incorrectly displays management VDOM as primary VDOM.

735248

On a mobile phone, the WiFi captive portal may take longer to load when the default firewall authentication login template is used and the user authentication type is set to HTTP.

739827

On FG-VM64-AZURE, administrator is logged out every few seconds, and the following message appears in the browser: Some cookies are misusing the recommended "SameSite" attribute.

746953

On the Network > Interfaces page, users cannot modify the TFTP server setting. A warning with the message This option may not function correctly. It is already configured using the CLI attribute: tftp-server. appears beside the DHCP Options entry.

Workaround: use the CLI.

749451

On the Network > SD-WAN page, the volume sent/received displayed in the charts does not match the values provided from the REST API when the RX and TX values of diagnose sys sdwan intf-sla-log exceed 232-1.

763925

GUI shows user as expired after entering a comment in guest management.

787565

When logged in as guest management administrator, the custom image shows as empty on the user information printout.

Workaround: use the regular Guest Management page.

792045

FortiGate failed to view matched endpoints after viewing it successfully several times.

HA

Bug ID

Description

662978

Long lasting sessions are expired on HA secondary device with a 10G interface.

683584

The hasync process crashed because the write buffer offset is not validated before using it.

683628

The hasync process crashes often with signal 11 in cases when a CMDB mind map file is deleted and some processes still mind map the old file.

717785

HA primary does not send anti-spam and outbreak prevention license information to the secondary.

750829

In large customer configurations, some functions may time out, which causes an unexpected failover and keeps high cmdbsvr usage for a long time.

751072

HA secondary is consistently unable to synchronize any sessions from the HA primary when the original HA primary returns.

752928

fnbamd uses ha-mgmt-interface for certificate related DNS queries when ha-direct is enabled.

754599

SCTP sessions are not fully synchronized between nodes in FGSP.

760562

hasync crashes when the size of hasync statistics packets is invalid.

763214

Firmware upgrade fails when the bandwidth between hbdev is reduced to 26 Mbps and lower (Check image file integrity error!).

764873

FGSP cluster with UTM does not forward UDP or ICMP packets to the session owner.

765619

HA desynchronizes after user from a read-only administrator group logs in.

766842

Long wait and timeout when upgrading FG- 3000D HA cluster due to vluster2 being enabled.

771389

SNMP community name with one extra character at the end stills matches when HA is enabled.

779512

If the interface name is a number, an error occurs when that number is used as an hbdev priority.

782769

Unable to form HA pair when HA encryption is enabled.

785514

In some situations, the fgfmd daemon is blocked by a query to the HA secondary checksum, which causes the tunnel between the FortiManager and FortiGate to go down.

786592

Failure in self-pinging towards the management IP.

794707

Get invalid IP address when creating a firewall object in the CLI; it synchronized to the secondary in FGSP standalone-config-sync.

801872

Unexpected HA failover on AWS A-P cluster when ipsec-soft-dec-async is enabled.

803697

The ha-mgmt-interface stops using the configured gateway6.

Intrusion Prevention

Bug ID

Description

622741

Traffic was blocked during the test with flow UTMs enabled.

698247

Flow mode web filter ovrd crashes and socket leaks in IPS daemon.

699775

Fortinet logo is missing on web filter block page in Chrome.

713508

Low download performance occurs when SSL deep Inspection is enabled on aggregate and VLAN interfaces when nTurbo is enabled.

739272

Users cannot visit websites with an explicit web proxy when the FortiGate enters conserve mode with fail-open disabled. Block pages appear with the replacement message, IPS Sensor Triggered!.

IPsec VPN

Bug ID

Description

622506 L2TP over IPsec tunnel established, but traffic cannot pass because wrong interface gets in route lookup.

623238

ADVPN shortcut cannot be established if both spokes are behind NAT.

771935

Offloaded transit ESP is dropped in one direction until session is not deleted.

773313

FG-40F-3G4G with WWAN DHCP interface set as L2TP client shows drops in WWAN connections and does not get the WWAN IP.

777476

When FGCP and FGSP is configured, but the FGCP cluster is not connected, IKE will ignore the resync event to synchronize SA data to the FGSP peer.

781403

IKE is consuming excessive memory.

786409

Tunnel had one-way traffic after iked crashed.

Log & Report

Bug ID

Description

621329

Mixed traffic and UTM logs are in the event log file because the current category in the log packet header is not big enough.

702859

Outdated report files deleted system event log keeps being generated.

708890

Traffic log of ZTNA HTTPS proxy and TCP forwarding is missing policy name and FortiClient ID.

726231

The default logtraffic setting (UTM) in a security policy unexpectedly generates a traffic log.

753904

The reportd process consumes a high amount of CPU.

764478

Logs are missing on FortiGate Cloud from the FortiGate.

768626

FortiGate does not send WELF (WebTrends Enhanced Log Format) logs.

769300

Traffic denied by security policy (NGFW policy-based mode) is shown as action="accept" in the traffic log.

774767

The expected reboot log is missing.

776929

When submitting files for sandbox logging in flow mode, filetype="unknown" is displayed for PDF, DOC, JS, RTF, ZIP, and RAR files.

Proxy

Bug ID

Description

604681

WAD process with SoC SSL acceleration enabled consumes more memory usage over time, which may lead to conserve mode.

Workaround: disable SoC SSL acceleration under the firewall SSL settings.

619637

In transparent proxy policy with authentication on corporate firewall, it shows Access Denied after authentication.

621787

On some smaller models, WAD watchdog times out when there is a lot of SSL traffic.

623213

Firewall does not handle 308 redirects properly for threat feed list.

624245

WAD crashes when all of these conditions are met: policy is doing deep inspection, SNI in client hello is in the exempt list, server certificate CNAME is not in the exempt list.

636508

FortiGate blocks traffic in transparent proxy policy, even if the traffic matches the proxy address.

678815

WAD crashes with signal 11 if the client sends a client hello containing a key share that does not match the key share that the server prefers.

717995

Proxy mode generates untagged traffic in a virtual wire pair.

747915

Deep inspection of SMTPS and POP3S starts to fail after restoring the configuration file of another device with the same model.

755685

Trend Micro client results in FortiGate illegal parameter SSL alert response because the Trend Micro client sent a ClientHello that includes extra data, which is declined by the FortiGate according to RFC 5246 7.4.1.2.

791662

FortiGate is silently dropping server hello in TLS negotiation.

802935

FortiGate cannot block a virus file when using the HTTP PATCH upload method.

803260

Memory increase suddenly and is not released until rebooting.

Routing

Bug ID

Description

580207

Policy route does not apply to local-out traffic.

618100

Link health monitor with HTTP/TCP echo cannot send out probe packets in the setting interval when the server is unreachable.

626549

SD-WAN rules created using ISDB do not match/forward via the correct interface.

666829

Application bfdd crashes.

717086

External resource local out traffic does not follow the SD-WAN rule and specified egress interface when the interface-select-method configuration in system external-resource is changed.

724541

One IPv6 BGP neighbor is allowed to be configured with one IPv6 address format and shows a different IPv6 address format.

729621

High CPU on hub BGPD due to hub FortiGate being unable to maintain BGP connections with more than 1K branches when route-reflector is enabled.

730194

742648

When syncing a large number of service qualities, there is a chance of accessing out-of-boundary memory, which causes the VWL daemon to crash.

745856

The default SD-WAN route for the LTE wwan interface is not created.

Workaround: add a random gateway to the wwan member.

config system sdwan
    config members
        edit 2
            set interface "wwan"
            set gateway 10.198.58.58
            set priority 100
        next
    end
end

756955

Routing table does not reflect the new changes for the static route until the routing process is restarted when cmdbsrv and other processes take CPU resources upon every configuration change in devices with over ten thousand firewall policies.

759752

FortiGate is sending malformed packets causing a BGP IPv6 peering flap when there is a large amount of IPv6 routes, and they cannot fit in one packet.

762258

When policy-based routing uses a PPPoE interface, the policy route order changes after rebooting and when the link is up/down.

771052

The set next-hop-self-rr6 enable parameter not effective.

778392

Kernel panic crash occurs after receiving new IPv6 prefix via BGP.

780210

Changing the interface weight under SD-WAN takes longer to be applied from the GUI than the CLI.

Security Fabric

Bug ID

Description

609182

Security Fabric Settings page sometimes cannot load FortiSandbox URL threat detection version despite FortiSandbox being connected.

614691

Slow GUI performance in large Fabric topology with over 50 downstream devices.

623689

CSF branch FortiGate cannot successfully connect/verify certificate with remote EMS server.

690812

FortiGate firewall dynamic address resolution lost when SDN connector updates its cache.

712155

The security rating for Admin Idle Timeout incorrectly fails for a FortiAnalyzer with less than 10 minutes.

718469

Wrong timestamp printed in the event log received in email from event triggered from email alert automation stitch.

724071

Log disk usage from user information history daemon is high and can restrict the use for general logging purposes.

788543

Topology tree shows No connection or Unauthorized for FortiAnalyzer while sending log data to FortiAnalyzer.

789820

The csfd process is causing high memory usage on the FortiGate.

SSL VPN

Bug ID

Description

613111

Traffic cannot pass through FortiGate in SSL VPN web mode if the user is a PKI peer.

613612

Important GUI pages in 6.4.0 are not rendered well by SSL VPN portal.

616429

Local user assigned with FortiToken cannot log in to SSL VPN web/tunnel mode when password change is required.

616879

Traffic cannot pass through FortiGate for SSL VPN web mode if the user is a PKI peer.

619914

Split-tunnel information is not recognized by legacy FortiClient SSL VPN Linux tool.

629373

SAML login button is lost on SSL VPN portal.

637018

After the upgrade to 6.0.10/6.2.4/6.4.0 SSL VPN portal mapping/remote authentication is matching user into the incorrect group.

740378

Windows FortiClient 7.0.1 cannot work with FortiOS 7.0.1 over SSL VPN when the tunnel IP is in the same subnet as one of the outgoing interfaces and NAT is not enabled.

741674

Customer internal website (https://cm***.msc****.com/x***) cannot be rendered in SSL VPN web mode.

745554

Logging in with SSO to FortiAnalyzer with SSL VPN web mode fails.

749857

Web mode and tunnel mode could not reflect the VRF setting, which causes the traffic to not pass through as expected.

756753

FQDN in firewall policy is treated case sensitive, which causes SSL VPN failure when redirecting or accessing a URL that contains capitalized characters.

757726

SSL VPN web portal does not serve updated certificate.

759664

Renaming the server entry configuration will break the connection between the IdP and FortiGate, which causes the SAML login for SSL VPN to not work as expected.

762685

Punycode is not supported in SSL VPN DNS split tunneling.

767869

SCADA portal will not fully load with SSL VPN web bookmark.

771162

Unable to access SSL VPN bookmark in web mode.

772191

Website is not loading in SSL VPN web mode.

774661

Unable to load SSL VPN web portal internal webpage.

774831

Comma character (,) is acting as delimiter in authentication session decoding when CN format is Surname, Name.

781542

Unable to access internal SSL VPN bookmark in web mode.

783508

After upgrading, NLA security mode for SSL VPN web portal bookmark does not work.

786179

Cannot reach local application (dat***.btn.co.id) while using SSL VPN web mode.

801588

After Kronos (third-party) update from 8.1.3 to 8.1.13, SSL VPN web portal users get a blank page after logging in successfully.

Switch Controller

Bug ID

Description

622812

VLANs on a FortiLink interface configured to use a hardware switch interface may fail to come up after upgrading or rebooting.

774848

Bulk MAC addresses deletions on FortiSwitch is randomly causing all wired clients to disconnect at the same time and reconnect.

System

Bug ID

Description

602141

The extender daemon crashes on Low Encryption (LENC) FortiGates.

610900

Low throughput on FG-2201E for traffic with ECN flag enabled.

613136

Uninitialized variable that may potentially cause httpsd signal 6 and 11 crash issue.

617154

Fortinet_CA is missing in FG-3400E.

617409

The FG-800D HA LED is off when HA status is normal.

617453

fgfmsd crash due to REST agent.

636069

Unable to handle kernel NULL pointer dereference at 000000000000008f.

644782

A large number of detected devices causes httpsd to consume resources, and causes low-end devices to enter conserve mode.

679059

The ipmc_sensord process is killed multiple times when the CPU or memory usage is high.

712321

Multiple ports flapping when a single interface is manually brought up. Affected platforms: FG-3810D and FG-3815D.

716250

Incorrect bandwidth utilization traffic widget for VLAN interface based on LACP interface.

717791

execute restore vmlicense tftp fails with tftp: bind: Address already in use.

718307

Verizon LTE connection is not stable, and the connection may drop after a few hours.

738423

Unable to create a hardware switch with no member.

749613

Unable to save configuration changes and get failed: No space left on device error on FG-61E, FG-81E, and FG-101E.

750171

Legitimate traffic is unable to go through with NP6 synproxy enabled.

750533

The cmdbsvr crashes when accessing an invalid firewall vip mapped IP that causes traffic to stop traversing the FortiGate.

751044

There is no sensor trap function and related logs on SoC4 platforms.

751870

User should be disallowed from sending an alert email from a customized address if the email security compliance check fails.

753912

FortiGate calculates faulty FDS weight with DST enabled.

757478

Kernel panic results in reboot due the size of inner Ethernet header and IP header not being checked properly when the SKB is received by the VXLAN interface.

764252

On FG-100F, no event is raised for PSU failure and the diagnostic command is not available.

764483

After restoring the VDOM configuration, Interface <VLAN> not found in the list! is present for VLANs on the aggregate interface.

771267

Zone transfer with FortiGate as primary DNS server fails if the FortiGate has more than 241 DNS entries.

773702

FortiGate running startup configuration is not saved on flash drive.

775529

Hardware switch is not passing VRRP packets.

778116

Restricted VDOM user is able to access the root VDOM.

779523

Negative tunnel_count in diagnose firewall gtp profile list for FGSP peer.

792544

A request is made to the remote authentication server before checking trusthost.

799255

Any configuration changes on FG-2601F causes cmbdr crash with signal 6 and traffic to stop flowing.

801985

Kernel panic occurs when a virtual switch with VLAN is created, and another port is configured with a trunk.

802917

PPPoE virtual tunnel drops traffic after logon credentials are changed.

809366

FG-40F with STP enabled on a hardware switch creates a loop after upgrading.

User & Authentication

Bug ID

Description

605437

FortiOS does not understand CMPv2 grantedWithMods response.

667150

Add GUI support for FortiToken Mobile push notification and FortiToken Cloud based on two-factor authentication, which is already supported by authd.

756763

In the email collection captive portal, a user can click Continue without selecting the checkbox to accept the terms and disclaimer agreement.

777004

Local users named pop or map do not work as expected when trying to add then as sources in a firewall policy.

VM

Bug ID

Description

622031

azd keeps crashing if Azure VM contains more than 15 tags.

623376

Multi zone HA breaks after upgrading to 6.4.0 because upgrade process does not add relevant items under VDOM exception.

721439

Problems occur when switching between HA broadcast heartbeat to unicast heartbeat and vice versa.

734148

The vmtoolsd and openvmtools processes are using a high amount of memory.

750889

DHCP relay fails when VMs on different VLAN interfaces use the same transaction ID.

781879

FortiFlex license activation failed to be applied to FortiGate VM in HA. Standalone mode is OK.

799536

Data partition is almost full on FG-VM64 platforms.

VoIP

Bug ID

Description

794517

VoIP daemon memory leak occurs when the following conditions are met:

  • The SIP call is on top of the IPsec tunnel.
  • The call fails before the setup completes (session gets closed in a state earlier than VOIP_SESSION_STATE_RUNNING).

Web Filter

Bug ID

Description

621807, 625897

Filtering Services Availability status is down on the GUI when HTTP/80 is used for web filtering rating service.

654160

Web filter profile count decreased after upgrading to 6.4.0 on FG-100F.

801792

IPS daemon has socket FD leaks.

WiFi Controller

Bug ID

Description

783209

The arrp-profile table cannot be purged if no entry is in use.

790367

FWF-60F has kernel panic and reboots by itself every few hours.

791761

CAPWAP tunnel traffic over WPA2-Enterprise SSID is dropped when offloading is enabled on FG-1800F.

801259

CLI script from FortiManager with two commands fails, but succeeds with one command.