Fortinet black logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.0.1. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID Description
566433 Setting the value for ca-cert causes LDAP authentication to fail sometimes.
589912 The version of OpenSSL needs to be upgraded to 1.1.1k.
598871 Some 4xxE switches report “failed BASE ID Check Sequence” and “failed reading register” errors.
686325 When many LLDP neighbors are connected to the FortiSwitch units, the daemon receiving the LLDP neighbor messages is overwhelmed and stops synchronizing the configuration.
701196 The root port for the spanning tree inter-chassis link (ICL) flaps in an MCLAG topology.
704377 After adding and then removing ip6-allowaccess ping from a VRF-enabled switch virtual interface (SVI), ping is still allowed through.
706717 The first time that the managed FS-108E-FPOE model attempts RADIUS authentication to the Cisco Identity Services Engine (ISE) always fails.
709837 The number of power supply units on the FS-448D model is not displayed correctly with the diagnose sys psu status command.
710229 When FortiSwitch 802.1x port-based authentication is configured on a switch port with learning-limit set to 1, traffic is not received on the FortiGate device.
711074 After a split-brain state is detected, some of the managed FortiSwitch units in the MCLAG topology are disconnected.
711950 After upgrading from 6.0.9 to 6.4.5, the FortiGate configuration is not being synchronized with the managed FortiSwitch units.
712323 After VRRP is enabled, the switch does not respond to ARP requests from the directly connected interface.
715261 Configuring allow-mac-move for 802.1x authentication does not work when using dynamic VLAN.
719044 After enabling a MACsec profile for a port, client traffic stopped flowing from that port.
719628 In an “MCLAG with access rings” topology, the managed switch crashes with an “Unable to handle kernel NULL pointer dereference at virtual address 0000000c” error.

Common vulnerabilities and exposures

FortiSwitchOS 7.0.1 is no longer vulnerable to the following CVEs:

  • CVE-2021-3449

Visit https://fortiguard.com/psirt for more information.

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.0.1. For inquiries about a particular bug, please contact Customer Service & Support.

Bug ID Description
566433 Setting the value for ca-cert causes LDAP authentication to fail sometimes.
589912 The version of OpenSSL needs to be upgraded to 1.1.1k.
598871 Some 4xxE switches report “failed BASE ID Check Sequence” and “failed reading register” errors.
686325 When many LLDP neighbors are connected to the FortiSwitch units, the daemon receiving the LLDP neighbor messages is overwhelmed and stops synchronizing the configuration.
701196 The root port for the spanning tree inter-chassis link (ICL) flaps in an MCLAG topology.
704377 After adding and then removing ip6-allowaccess ping from a VRF-enabled switch virtual interface (SVI), ping is still allowed through.
706717 The first time that the managed FS-108E-FPOE model attempts RADIUS authentication to the Cisco Identity Services Engine (ISE) always fails.
709837 The number of power supply units on the FS-448D model is not displayed correctly with the diagnose sys psu status command.
710229 When FortiSwitch 802.1x port-based authentication is configured on a switch port with learning-limit set to 1, traffic is not received on the FortiGate device.
711074 After a split-brain state is detected, some of the managed FortiSwitch units in the MCLAG topology are disconnected.
711950 After upgrading from 6.0.9 to 6.4.5, the FortiGate configuration is not being synchronized with the managed FortiSwitch units.
712323 After VRRP is enabled, the switch does not respond to ARP requests from the directly connected interface.
715261 Configuring allow-mac-move for 802.1x authentication does not work when using dynamic VLAN.
719044 After enabling a MACsec profile for a port, client traffic stopped flowing from that port.
719628 In an “MCLAG with access rings” topology, the managed switch crashes with an “Unable to handle kernel NULL pointer dereference at virtual address 0000000c” error.

Common vulnerabilities and exposures

FortiSwitchOS 7.0.1 is no longer vulnerable to the following CVEs:

  • CVE-2021-3449

Visit https://fortiguard.com/psirt for more information.