Known issues
The following issues have been identified in version 7.0.12. To inquire about a particular bug or report a bug, please contact Customer Service & Support.
Anti Spam
Bug ID |
Description |
---|---|
877613 |
Mark as Reject can be still chosen as an Action in an Anti-Spam Block/Allow List in the GUI. |
Explicit Proxy
Bug ID |
Description |
---|---|
817582 |
When there are many users authenticated by an explicit proxy policy, the Firewall Users widget can take a long time to load. This issue does not impact explicit proxy functionality. |
942612 |
Web proxy forward server does not convert HTTP version to the original version when sending them back to the client. |
Firewall
Bug ID |
Description |
---|---|
719311 |
On the Policy & Objects > Firewall Policy page in 6.4.0 onwards, the IPv4 and IPv6 policy tables are combined but the custom section name (global label) is not automatically checked for duplicates. If there is a duplicate custom section name, the policy list may show empty for that section. This is a display issue only and does not impact policy traffic. Workaround: rename the custom section to unique name between IPv4 and IPv6 policies. |
843554 |
If the first firewall service object in the service list (based on the order in the command line table) has a protocol type of IP, the GUI may incorrectly modify its protocol number whenever a new firewall service of the same protocol type IP is created in the GUI. This silent misconfiguration can result in unexpected behavior of firewall policies that use the impacted service. For example, some 6K and 7K platforms have firewall service ALL (protocol type IP) as the first service, and this can cause the ALL service to be modified unexpectedly. Workaround: create a new service in the CLI, or move a non-IP type services to the top of the firewall service list. For example, if config firewall service custom edit "unused" set tcp-portrange 1 next move "unused" before "ALL" end |
897849 |
Firewall Policy list may show empty sequence grouping sections if multiple policies are sharing the same Workaround: drag and drop the policy to the correct sequence group in the GUI, or remove the
|
FortiView
Bug ID |
Description |
---|---|
941521 |
On the Dashboard > FortiView Websites page, the Category filter does not work in the Japanese GUI. |
GUI
Bug ID |
Description |
---|---|
440197 |
On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly. |
677806 |
On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status. |
685431 |
On the Policy & Objects > Firewall Policy page, the policy list can take around 30 seconds or more to load when there is a large number (over 20 thousand) of policies. Workaround: use the CLI to configure policies. |
707589 |
System > Certificates list sometimes shows an incorrect reference count for a certificate, and incorrectly allows a user to delete a referenced certificate. The deletion will fail even though a success message is shown. Users should be able to delete the certificate after all references are removed. |
708005 |
When using the SSL VPN web portal in the Firefox, users cannot paste text into the SSH terminal emulator. Workaround: use Chrome, Edge, or Safari as the browser. |
755177 |
When upgrading firmware from 7.0.1 to 7.0.2, the GUI incorrectly displays a warning saying this is not a valid upgrade path. |
810225 |
An undefined error is displayed when changing an administrator password for the first time. Affected models: NP7 platforms. |
853352 |
When viewing entries in the slide-out window of the Policy & Objects > Internet Service Database page, users cannot scroll down to the end if there are over 100000 entries. |
881678 |
On the Network > Routing Objects page, editing a prefix list with a large number of rule entries fails with an error notification that The integer value is not within valid range. Workaround: edit a prefix list with a large number of rule entries in the CLI. |
893560 |
When private data encryption is enabled, the GUI may become unresponsive and HA may fail to synchronize the configuration. |
898902 |
In the System > Administrators dialog, when there are a lot of VDOMs (over 200), the dialog can take more than one minute to load the Two-factor Authentication toggle. This issue does not affect configuring other settings in the dialog. Workaround: use the CLI to configure |
907041 |
Network > SD-WAN > SD-WAN Zones and SD-WAN Rules pages do not load if a shortcut tunnel is triggered. Workaround: to load the Network > SD-WAN page, temporarily bring down the ADVPN shortcut tunnels, go to the Network > SD-WAN page, and bring it back up after. |
HA
Bug ID |
Description |
---|---|
818432 |
When private data encryption is enabled, all passwords present in the configuration fail to load and may cause HA failures. |
Hyperscale
Bug ID |
Description |
---|---|
811109 |
FortiGate 4200F, 4201F, 4400F, and 4401F HA1, HA2, AUX1, and AUX2 interfaces cannot be added to an LAG. |
836976 |
Sessions being processed by hyperscale firewall policies with hardware logging may be dropped when dynamically changing the |
838654 |
Hit count not ticking for implicit deny policy for hardware session in case of NAT46 and NAT64 traffic. |
839958 |
|
842659 |
|
843132 |
Access control list (ACL) policies added to a hyperscale firewall VDOM that is processing traffic may take longer than expected to become effective. During a transition period, traffic that should be blocked by the new ACL policy will be allowed. |
843197 |
Output of |
843266 |
Diagnose command should be available to show |
843305 |
Get |
844421 |
The |
846520 |
NPD/LPMD process killed by out of memory killer after running mixed sessions and HA failover. |
915796 |
With an enabled hyperscale license, in some cases with exception traffic (like ICMP error traverse), the FortiGate may experience unexpected disruptions when handling the exception traffic. |
941784 |
Hardware session synchronization does not work on FG-480xF devices in hyperscale. |
1054041 |
On FortiGate's in an HA environment, DHCP clients can not connect to the DHCP server. |
Intrusion Prevention
Bug ID |
Description |
---|---|
926639 |
Constant reloading of the shared memory external domain table is causing high CPU usage due to lock contention when reloading the table. |
IPsec VPN
Bug ID |
Description |
---|---|
761754 |
IPsec aggregate static route is not marked inactive if the IPsec aggregate is down. |
766750 |
FortiGate does not accept secondary tunnel IP address in the same subnet as the primary tunnel. |
Log & Report
Bug ID |
Description |
---|---|
850642 |
Logs are not seen for traffic passing through the firewall caused by numerous simultaneous configuration changes. |
860822 |
When viewing logs on the Log & Report > System Events page, filtering by domain\username does not display matching entries. Workaround: use a double backslash (domain\\username) while filtering or searching by username only without the domain. |
893199 |
The FortiGate does not generate deallocate/allocate logs of the first IP pool when the first IP pool has been exhausted. |
932537 |
If Security Rating is enabled to run on schedule (every four hours), the FortiGate can unintentionally send local-out traffic to fortianalyzer.forticloud.com during the Security Rating run. Workaround: disable on-schedule Security Rating run. config system global set security-rating-run-on-schedule disable end |
Proxy
Bug ID |
Description |
---|---|
783549 |
An error condition occurs in WAD caused by multiple outstanding requests sent from the client to server with UTM enabled. |
1001497 |
FortiGate may enter conserve mode when posting a non or invalid HTTP date through web proxy. |
Remote Access
Bug ID |
Description |
---|---|
837391 |
FortiClient does not send the public IP address for SAML, resulting in 0.0.0.0 being shown in FortiOS and SASE. |
Routing
Bug ID |
Description |
---|---|
924940 |
When there are a lot of policies (several thousands), the interface member selection for the SD-WAN Zone dialog may take up to a minute to load. Workaround: use the CLI to configure the SD-WAN zone. |
Security Fabric
Bug ID |
Description |
---|---|
614691 |
Slow GUI performance in large Fabric topology with over 50 downstream devices. |
794703 |
Security Rating report for Rogue AP Detection and FortiCare Support checks show incorrect results. |
862424 |
On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables), security rating reports may cause the FortiGate to go into conserve mode. |
SSL VPN
Bug ID |
Description |
---|---|
887674 |
FortiGate will intermittently stop accepting new SSL VPN connections across all VDOMs. |
System
Bug ID |
Description |
---|---|
724085 |
Traffic passing through an EMAC VLAN interface when the parent interface is in another VDOM is blocked if NP7 offloading is enabled. Workaround: set the |
842159 |
FortiGate 200F interfaces stop passing traffic after some time. |
847664 |
Console may display |
882187 |
FortiGate might enter conserve mode if disk logging is enabled and |
884023 |
When a user is logged in as a VDOM administrator with restricted access and tries to upload a certificate (System > Certificates), the Create button on the Create Certificate pane is grayed out. |
901721 |
In a certain edge case, traffic directed towards a VLAN interface could trigger a kernel interruption. |
903397 |
After upgrading to 7.0.11, FortiOS cannot display QSFP+ transceiver information. Affected platforms: FG-110xE, FG-220xE, FG-330xE, FG-340xE, and FG-360xE. |
904486 |
FortiGate may display a false alarm message and subsequently initiate a reboot. |
910651 |
All members are up on an FG-600F, but the LACP status is showing as down after upgrading. |
923364 |
System goes into halt state with Workaround: set the BIOS security level to 0 or 1. |
931299 |
When the URL filter requests the FortiGuard (FGD) rating server address using DNS, it will try to get both A (IPv4) and AAAA (IPv6) records. |
1041457 |
The kernel 4.19 cannot concurrently reassemble IPv4 fragments for a source IP with more than 64 destination IP addresses. |
Upgrade
Bug ID |
Description |
---|---|
925567 |
When upgrading multiple firmware versions in the GUI, the Follow upgrade path option does not respect the recommended upgrade path. |
Web Filter
Bug ID |
Description |
---|---|
766126 |
Block replacement page is not pushed automatically to replace the video content when using a video filter. |
WiFi Controller
Bug ID |
Description |
---|---|
814541 |
When there are extra large number of managed FortiAP devices (over 500) and large number of WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long time to load. This issue does not impact FortiAP operation. |
904349 |
Unable to create FortiAP profile in the GUI for dual-5G mode FortiAP U231F/U431F models. Workaround: use the CLI to update the profile to dual-5G mode. |
ZTNA
Bug ID |
Description |
---|---|
819987 |
SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting. |
848222 |
ZTNA TCP forwarding is not working when a real server is configured with an FQDN address type. An FQDN address type that can resolve public IPs is not recommended for ZTNA TCP forwarding on real servers because the defined internal DNS database zone is trying to override it at the same time. By doing so, the internal private address may not take effect after rebooting, and causes a ZTNA TCP forwarding failure due to the real server not being found. |