Fortinet white logo
Fortinet white logo

FortiOS Release Notes

Known issues

Known issues

The following issues have been identified in version 7.0.15. To inquire about a particular bug or report a bug, please contact Customer Service & Support.

Firewall

Bug ID

Description

843554

If the first firewall service object in the service list (based on the order in the command line table) has a protocol type of IP, the GUI may incorrectly modify its protocol number whenever a new firewall service of the same protocol type IP is created in the GUI.

This silent misconfiguration can result in unexpected behavior of firewall policies that use the impacted service. For example, some 6K and 7K platforms have firewall service ALL (protocol type IP) as the first service, and this can cause the ALL service to be modified unexpectedly.

Workaround: create a new service in the CLI, or move a non-IP type services to the top of the firewall service list. For example, if ALL is the first firewall service in the list:

config firewall service custom
    edit "unused"
        set tcp-portrange 1
    next
    move "unused" before "ALL"
end

912740

On a FortiGate managed by FortiManager, after upgrading to 7.0.13, the Firewall Policy list may show separate sequence grouping for each policy because the global-label is updated to be unique for each policy.

Workaround: drag and drop the policy to the correct sequence group in the GUI, or remove the global-label for each member policy in the group except for the leading policy.

  • Policy 1 (global-label "group1")

  • Policy 2

  • Policy 3 (global-label "group2")

  • Policy 4

951984

For local out DNAT traffic, the best output route may not be found.

985508

When allow-traffic-redirect is enabled, redirect traffic that ingresses and egresses from the same interface may incorrectly get dropped if the source address of the incoming packet is different from the FortiGate's interface subnet and there is no firewall policy to allow the matched traffic.

Workaround: disable allow-traffic-redirect and create a firewall policy to allow traffic to ingress and egress for the same interface.

config system global
    set allow-traffic-redirect disable
end

FortiView

Bug ID

Description

941521

On the Dashboard > FortiView Websites page, the Category filter does not work in the Japanese GUI.

GUI

Bug ID

Description

440197

On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly.

677806

On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status.

685431

On the Policy & Objects > Firewall Policy page, the policy list can take around 30 seconds or more to load when there is a large number (over 20 thousand) of policies.

Workaround: use the CLI to configure policies.

707589

System > Certificates list sometimes shows an incorrect reference count for a certificate, and incorrectly allows a user to delete a referenced certificate. The deletion will fail even though a success message is shown. Users should be able to delete the certificate after all references are removed.

708005

When using the SSL VPN web portal in the Firefox, users cannot paste text into the SSH terminal emulator.

Workaround: use Chrome, Edge, or Safari as the browser.

755177

When upgrading firmware from 7.0.1 to 7.0.2, the GUI incorrectly displays a warning saying this is not a valid upgrade path.

810225

An undefined error is displayed when changing an administrator password for the first time. Affected models: NP7 platforms.

853352

On the View/Edit Entries slide-out pane (Policy & Objects > Internet Service Database dialog), users cannot scroll down to the end if there are over 100000 entries.

881678

On the Network > Routing Objects page, editing a prefix list with a large number of rule entries fails with an error notification that The integer value is not within valid range.

Workaround: edit a prefix list with a large number of rule entries in the CLI.

898902

In the System > Administrators dialog, when there are a lot of VDOMs (over 200), the dialog can take more than one minute to load the Two-factor Authentication toggle. This issue does not affect configuring other settings in the dialog.

Workaround: use the CLI to configure two-factor-authentication under config system admin.

974988

FortiGate GUI should not show a license expired notification due to an expired device-level FortiManager Cloud license if it still has a valid account-level FortiManager Cloud license (function is not affected).

Hyperscale

Bug ID

Description

811109

FortiGate 4200F, 4201F, 4400F, and 4401F HA1, HA2, AUX1, and AUX2 interfaces cannot be added to an LAG.

836976

Sessions being processed by hyperscale firewall policies with hardware logging may be dropped when dynamically changing the log-processor setting from hardware to host for the hardware log sever added to the hyperscale firewall policy. To avoid dropping sessions, change the log-processor setting during quiet periods.

838654

Hit count not ticking for implicit deny policy for hardware session in case of NAT46 and NAT64 traffic.

842659

srcaddr-negate and dstaddr-negate are not working properly for IPv6 traffic with FTS.

843132

Access control list (ACL) policies added to a hyperscale firewall VDOM that is processing traffic may take longer than expected to become effective. During a transition period, traffic that should be blocked by the new ACL policy will be allowed.

843197

Output of diagnose sys npu-session list/list-full does not mention policy route information.

843266

Diagnose command should be available to show hit_count/last_used for policy route and NPU session on hyperscale VDOM.

843305

Get PARSE SKIP ERROR=17 NPD ERR PBR ADDRESS console error log when system boots up.

844421

The diagnose firewall ippool list command does not show the correct output for overload type IP pools.

846520

NPD/LPMD process killed by out of memory killer after running mixed sessions and HA failover.

941784

Hardware session synchronization does not work on FG-480xF devices in hyperscale.

986656

On the HA primary unit, the npu-session list shows many sessions, but the npu-session state shows 0.

IPsec VPN

Bug ID

Description

761754

IPsec aggregate static route is not marked inactive if the IPsec aggregate is down.

945367

Disabling src-check (RPF) on the parent tunnel is not inherited by ADVPN shortcuts.

1009332

Traffic is interrupted on SPOKEs after upgrading to version 7.0.14 due to one NPU SA race condition.

Log & Report

Bug ID

Description

850642

Logs are not seen for traffic passing through the firewall caused by numerous simultaneous configuration changes.

872493

Disk logging files are cached in the kernel, causing high memory usage.

Proxy

Bug ID

Description

1001497

FortiGate may enter conserve mode when posting a non or invalid HTTP date through web proxy.

Security Fabric

Bug ID

Description

614691

Slow GUI performance in large Fabric topology with over 50 downstream devices.

794703

Security Rating report for Rogue AP Detection and FortiCare Support checks show incorrect results.

862424

On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables), security rating reports may cause the FortiGate to go into conserve mode.

SSL VPN

Bug ID

Description

1024837

OneLogin SAML does not work with SSL VPN after upgrading to version 7.0.15 or 7.4.3.

System

Bug ID

Description

847664

Console may display mce: [Hardware Error] error message after fresh image burn or reboot.

861962

When configuring an 802.3ad aggregate interface with a 1 Gbps speed, the port's LED is off and traffic cannot pass through. Affected platforms: 110xE, 220xE, 330xE, 340xE, and 360xE.

901721

In a certain edge case, traffic directed towards a VLAN interface could cause a kernel interruption.

934708

The cmdbsvr could not secure the var_zone lock due to another process holding it indefinitely.

975496

FortiGate 200F experiences slow download and upload speeds when traversing from a 1G to a 10G interface.

1003026

On SoC3/SoC4 platforms, a kernel interruption may occur when running WAD monitoring scripts.

1041457

The kernel 4.19 cannot concurrently reassemble IPv4 fragments for a source IP with more than 64 destination IP addresses.

Upgrade

Bug ID

Description

925567

When upgrading multiple firmware versions in the GUI, the Follow upgrade path option does not respect the recommended upgrade path.

VM

Bug ID

Description

800935

ESXi VLAN interface based on LACP does not work.

1073016

The OCI SDN connector cannot call the API to the Oracle service when an IAM role is enabled.

Web Filter

Bug ID

Description

766126

Block replacement page is not pushed automatically to replace the video content when using a video filter.

WiFi Controller

Bug ID

Description

814541

When there are extra large number of managed FortiAP devices (over 500) and large number of WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long time to load. This issue does not impact FortiAP operation.

903922

Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation.

989929

An kernel interruption occurs on FWF-40F/60F models when WiFi stations connect to SSID on the local radio.

1001672

FortiWiFi reboots or becomes unresponsive when connecting to SSID after upgrading to 7.0.14.

1004338

After an upgrade or reboot on the NP7 platform, WiFi data cannot pass through when the SSID VLAN interface uses the DHCP Relay Server.

ZTNA

Bug ID

Description

819987

SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting.

848222

ZTNA TCP forwarding is not working when a real server is configured with an FQDN address type.

An FQDN address type that can resolve public IPs is not recommended for ZTNA TCP forwarding on real servers because the defined internal DNS database zone is trying to override it at the same time. By doing so, the internal private address may not take effect after rebooting, and causes a ZTNA TCP forwarding failure due to the real server not being found.

Known issues

Known issues

The following issues have been identified in version 7.0.15. To inquire about a particular bug or report a bug, please contact Customer Service & Support.

Firewall

Bug ID

Description

843554

If the first firewall service object in the service list (based on the order in the command line table) has a protocol type of IP, the GUI may incorrectly modify its protocol number whenever a new firewall service of the same protocol type IP is created in the GUI.

This silent misconfiguration can result in unexpected behavior of firewall policies that use the impacted service. For example, some 6K and 7K platforms have firewall service ALL (protocol type IP) as the first service, and this can cause the ALL service to be modified unexpectedly.

Workaround: create a new service in the CLI, or move a non-IP type services to the top of the firewall service list. For example, if ALL is the first firewall service in the list:

config firewall service custom
    edit "unused"
        set tcp-portrange 1
    next
    move "unused" before "ALL"
end

912740

On a FortiGate managed by FortiManager, after upgrading to 7.0.13, the Firewall Policy list may show separate sequence grouping for each policy because the global-label is updated to be unique for each policy.

Workaround: drag and drop the policy to the correct sequence group in the GUI, or remove the global-label for each member policy in the group except for the leading policy.

  • Policy 1 (global-label "group1")

  • Policy 2

  • Policy 3 (global-label "group2")

  • Policy 4

951984

For local out DNAT traffic, the best output route may not be found.

985508

When allow-traffic-redirect is enabled, redirect traffic that ingresses and egresses from the same interface may incorrectly get dropped if the source address of the incoming packet is different from the FortiGate's interface subnet and there is no firewall policy to allow the matched traffic.

Workaround: disable allow-traffic-redirect and create a firewall policy to allow traffic to ingress and egress for the same interface.

config system global
    set allow-traffic-redirect disable
end

FortiView

Bug ID

Description

941521

On the Dashboard > FortiView Websites page, the Category filter does not work in the Japanese GUI.

GUI

Bug ID

Description

440197

On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates shows an Unknown status, even if the server is working correctly. This is a display issue only; the override feature is working properly.

677806

On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status.

685431

On the Policy & Objects > Firewall Policy page, the policy list can take around 30 seconds or more to load when there is a large number (over 20 thousand) of policies.

Workaround: use the CLI to configure policies.

707589

System > Certificates list sometimes shows an incorrect reference count for a certificate, and incorrectly allows a user to delete a referenced certificate. The deletion will fail even though a success message is shown. Users should be able to delete the certificate after all references are removed.

708005

When using the SSL VPN web portal in the Firefox, users cannot paste text into the SSH terminal emulator.

Workaround: use Chrome, Edge, or Safari as the browser.

755177

When upgrading firmware from 7.0.1 to 7.0.2, the GUI incorrectly displays a warning saying this is not a valid upgrade path.

810225

An undefined error is displayed when changing an administrator password for the first time. Affected models: NP7 platforms.

853352

On the View/Edit Entries slide-out pane (Policy & Objects > Internet Service Database dialog), users cannot scroll down to the end if there are over 100000 entries.

881678

On the Network > Routing Objects page, editing a prefix list with a large number of rule entries fails with an error notification that The integer value is not within valid range.

Workaround: edit a prefix list with a large number of rule entries in the CLI.

898902

In the System > Administrators dialog, when there are a lot of VDOMs (over 200), the dialog can take more than one minute to load the Two-factor Authentication toggle. This issue does not affect configuring other settings in the dialog.

Workaround: use the CLI to configure two-factor-authentication under config system admin.

974988

FortiGate GUI should not show a license expired notification due to an expired device-level FortiManager Cloud license if it still has a valid account-level FortiManager Cloud license (function is not affected).

Hyperscale

Bug ID

Description

811109

FortiGate 4200F, 4201F, 4400F, and 4401F HA1, HA2, AUX1, and AUX2 interfaces cannot be added to an LAG.

836976

Sessions being processed by hyperscale firewall policies with hardware logging may be dropped when dynamically changing the log-processor setting from hardware to host for the hardware log sever added to the hyperscale firewall policy. To avoid dropping sessions, change the log-processor setting during quiet periods.

838654

Hit count not ticking for implicit deny policy for hardware session in case of NAT46 and NAT64 traffic.

842659

srcaddr-negate and dstaddr-negate are not working properly for IPv6 traffic with FTS.

843132

Access control list (ACL) policies added to a hyperscale firewall VDOM that is processing traffic may take longer than expected to become effective. During a transition period, traffic that should be blocked by the new ACL policy will be allowed.

843197

Output of diagnose sys npu-session list/list-full does not mention policy route information.

843266

Diagnose command should be available to show hit_count/last_used for policy route and NPU session on hyperscale VDOM.

843305

Get PARSE SKIP ERROR=17 NPD ERR PBR ADDRESS console error log when system boots up.

844421

The diagnose firewall ippool list command does not show the correct output for overload type IP pools.

846520

NPD/LPMD process killed by out of memory killer after running mixed sessions and HA failover.

941784

Hardware session synchronization does not work on FG-480xF devices in hyperscale.

986656

On the HA primary unit, the npu-session list shows many sessions, but the npu-session state shows 0.

IPsec VPN

Bug ID

Description

761754

IPsec aggregate static route is not marked inactive if the IPsec aggregate is down.

945367

Disabling src-check (RPF) on the parent tunnel is not inherited by ADVPN shortcuts.

1009332

Traffic is interrupted on SPOKEs after upgrading to version 7.0.14 due to one NPU SA race condition.

Log & Report

Bug ID

Description

850642

Logs are not seen for traffic passing through the firewall caused by numerous simultaneous configuration changes.

872493

Disk logging files are cached in the kernel, causing high memory usage.

Proxy

Bug ID

Description

1001497

FortiGate may enter conserve mode when posting a non or invalid HTTP date through web proxy.

Security Fabric

Bug ID

Description

614691

Slow GUI performance in large Fabric topology with over 50 downstream devices.

794703

Security Rating report for Rogue AP Detection and FortiCare Support checks show incorrect results.

862424

On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables), security rating reports may cause the FortiGate to go into conserve mode.

SSL VPN

Bug ID

Description

1024837

OneLogin SAML does not work with SSL VPN after upgrading to version 7.0.15 or 7.4.3.

System

Bug ID

Description

847664

Console may display mce: [Hardware Error] error message after fresh image burn or reboot.

861962

When configuring an 802.3ad aggregate interface with a 1 Gbps speed, the port's LED is off and traffic cannot pass through. Affected platforms: 110xE, 220xE, 330xE, 340xE, and 360xE.

901721

In a certain edge case, traffic directed towards a VLAN interface could cause a kernel interruption.

934708

The cmdbsvr could not secure the var_zone lock due to another process holding it indefinitely.

975496

FortiGate 200F experiences slow download and upload speeds when traversing from a 1G to a 10G interface.

1003026

On SoC3/SoC4 platforms, a kernel interruption may occur when running WAD monitoring scripts.

1041457

The kernel 4.19 cannot concurrently reassemble IPv4 fragments for a source IP with more than 64 destination IP addresses.

Upgrade

Bug ID

Description

925567

When upgrading multiple firmware versions in the GUI, the Follow upgrade path option does not respect the recommended upgrade path.

VM

Bug ID

Description

800935

ESXi VLAN interface based on LACP does not work.

1073016

The OCI SDN connector cannot call the API to the Oracle service when an IAM role is enabled.

Web Filter

Bug ID

Description

766126

Block replacement page is not pushed automatically to replace the video content when using a video filter.

WiFi Controller

Bug ID

Description

814541

When there are extra large number of managed FortiAP devices (over 500) and large number of WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long time to load. This issue does not impact FortiAP operation.

903922

Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation.

989929

An kernel interruption occurs on FWF-40F/60F models when WiFi stations connect to SSID on the local radio.

1001672

FortiWiFi reboots or becomes unresponsive when connecting to SSID after upgrading to 7.0.14.

1004338

After an upgrade or reboot on the NP7 platform, WiFi data cannot pass through when the SSID VLAN interface uses the DHCP Relay Server.

ZTNA

Bug ID

Description

819987

SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting.

848222

ZTNA TCP forwarding is not working when a real server is configured with an FQDN address type.

An FQDN address type that can resolve public IPs is not recommended for ZTNA TCP forwarding on real servers because the defined internal DNS database zone is trying to override it at the same time. By doing so, the internal private address may not take effect after rebooting, and causes a ZTNA TCP forwarding failure due to the real server not being found.