Fortinet black logo

Resolved issues

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.0.5. For inquiries about a particular bug, please contact Customer Service & Support.

784987

SNMP index numbers should be assigned the same for split ports and regular ports.

787797

The FortiSwitch unit does not allow VTP traffic between Cisco switches.

796030

The SNMP agent should be able to poll loopback interfaces.

796655

The Switch > Monitor > 802.1x Status page does not sort the MAC addresses correctly and does not display VLAN traffic.

796779

The Switch > Monitor > IGMP Snooping page does not display IGMP groups.

796806

The set cfg-save revert command under config system global now reboots the FortiSwitch unit after waiting the number of seconds configured in the set cfg-revert-timeout command.

802529

After rebooting a FortiSwitch unit, IP source guard with DHCP snooping does not work.

802634

Using the set poe-alarm-threshold command does not work.

802786 Virtual IP addresses cannot be used in a FortiGate device to redirect the public IP address to the private IP address of the FortiSwitch unit.
803579 The “port24 Overload state. POE disabled” message appears in the log every hour.
807291 After updating the FortiSwitchOS 7.2.0, the switch fails with an “Out of memory: kill process” log message.
814741 MAC authentication bypass (MAB) authentication sometimes does not work on a managed FS-108E.
816749 After enabling flood-unknown-multicast, the IGMP-snooping querier port does not work.
818959 The DHCP server does not allow DHCP clients to move from one interface to another.
824605 The object identifier (OID) 1.3.6.1.2.1.10.7.2.1.19 does not work on FS-1048E.

824283

The output of the diagnose switch physical-ports qos-stat list command shows the same number of dropped packets for queue 0 for all ports.

825614

The status of the second power supply unit is incorrectly reported as “Not OK.”

Common vulnerabilities and exposures

FortiSwitchOS 7.0.5 is no longer vulnerable to the following vulnerabilities and exposures:

  • CWE-200

  • CWE-329

  • CWE-352

  • CWE-610

Visit https://fortiguard.com/psirt for more information.

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.0.5. For inquiries about a particular bug, please contact Customer Service & Support.

784987

SNMP index numbers should be assigned the same for split ports and regular ports.

787797

The FortiSwitch unit does not allow VTP traffic between Cisco switches.

796030

The SNMP agent should be able to poll loopback interfaces.

796655

The Switch > Monitor > 802.1x Status page does not sort the MAC addresses correctly and does not display VLAN traffic.

796779

The Switch > Monitor > IGMP Snooping page does not display IGMP groups.

796806

The set cfg-save revert command under config system global now reboots the FortiSwitch unit after waiting the number of seconds configured in the set cfg-revert-timeout command.

802529

After rebooting a FortiSwitch unit, IP source guard with DHCP snooping does not work.

802634

Using the set poe-alarm-threshold command does not work.

802786 Virtual IP addresses cannot be used in a FortiGate device to redirect the public IP address to the private IP address of the FortiSwitch unit.
803579 The “port24 Overload state. POE disabled” message appears in the log every hour.
807291 After updating the FortiSwitchOS 7.2.0, the switch fails with an “Out of memory: kill process” log message.
814741 MAC authentication bypass (MAB) authentication sometimes does not work on a managed FS-108E.
816749 After enabling flood-unknown-multicast, the IGMP-snooping querier port does not work.
818959 The DHCP server does not allow DHCP clients to move from one interface to another.
824605 The object identifier (OID) 1.3.6.1.2.1.10.7.2.1.19 does not work on FS-1048E.

824283

The output of the diagnose switch physical-ports qos-stat list command shows the same number of dropped packets for queue 0 for all ports.

825614

The status of the second power supply unit is incorrectly reported as “Not OK.”

Common vulnerabilities and exposures

FortiSwitchOS 7.0.5 is no longer vulnerable to the following vulnerabilities and exposures:

  • CWE-200

  • CWE-329

  • CWE-352

  • CWE-610

Visit https://fortiguard.com/psirt for more information.