Introduction
This document provides the following information for FortiOS 5.4.2 build 1100:
- Special Notices
- Upgrade Information
- Product Integration and Support
- Resolved Issues
- Known Issues
- Limitations
See the Fortinet Document Library for FortiOS documentation.
Supported models
FortiOS 5.4.2 supports the following models.
FortiGate | FG-30D, FG-30E, FG-30D-POE, FG-50E, FG-51E, FG-60D, FG-60D-POE, FG-70D,
FG-70D-POE, FG-80C, FG-80CM, FG-80D, FG-90D FG-90D, FG-90D-POE, FG92D, FG-94D-POE, FG-98D-POE, FG-100D, FG-140D, FG-140D-POE, FG- 200D, FG-200D-POE, FG-240D, FG-240D-POE, FG-280D-POE, FG-300D, FG-400D, FG500D, FG-600C, FG-600D, FG-800C, FG-800D, FG-900D, FG-1000C, FG-1000D, FG-1200D, FG-1500D, FG-1500DT, FG-3000D, FG-3100D, FG-3200D, FG-3240C, FG-3600C, FG-3700D, FG-3700DX, FG-3810D, FG-3815D, FG-5001C, FG-5001D |
FortiWiFi | FWF-30D, FWF-30E, FWF-30D-POE, FWF-50E, FWF-51E, FWF-60D, FWF-60DPOE, FWF-80CM, FWF-81CM, FWF-90D, FWF-90D-POE, FWF-92D |
FortiGate Rugged | FGR-60D, FGR-90D |
FortiGate VM | FG-SVM, FG-VM64, FG-VM64-AWS, FG-VM64-AWSONDEMAND, FG-VM64-HV, FG-VM64-KVM, FG-VMX, FG-VM64-XEN |
Pay-as-you-go images | FOS-VM64, FOS-VM64-KVM |
FortiOS Carrier | FortiOS Carrier 5.4.2 images are delivered upon request and are not available on the customer support firmware download page. |
What’s new in FortiOS 5.4.2
For a detailed list of new features and enhancements that have been made in FortiOS 5.4.2, see the What’s New for FortiOS 5.4.2 document available in the Fortinet Document Library.
Special Notices
Built-In Certificate
FortiGate and FortiWiFi D-series and above have a built in Fortinet_Factory certificate that uses a 2048-bit certificate with the 14 DH group.
Default log setting change
For FG-5000 blades, log disk is disabled by default. It can only be enabled via CLI. For all 2U & 3U models (FG3600/FG-3700/FG-3800), log disk is also disabled by default. For all 1U models and desktop models that supports SATA disk, log disk is enabled by default.
FortiAnalyzer Support
In version 5.4, encrypting logs between FortiGate and FortiAnalyzer is handled via SSL encryption. The IPsec option is no longer available and users should reconfigure in GUI or CLI to select the SSL encryption option as needed.
Removed SSL/HTTPS/SMTPS/IMAPS/POP3S
SSL/HTTPS/SMTPS/IMAPS/POP3S options were removed from server-load-balance on low end models below FG-100D except FG-80C and FG-80CM.
FortiGate and FortiWiFi-92D Hardware Limitation
FortiOS 5.4.0 reported an issue with the FG-92D model in the Special Notices > FG-92D High Availability in Interface Mode section of the release notes. Those issues, which were related to the use of port 1 through 14, include:
- PPPoE failing, HA failing to form l IPv6 packets being dropped l FortiSwitch devices failing to be discovered
- Spanning tree loops may result depending on the network topology
FG-92D and FWF-92D do not support STP. These issues have been improved in FortiOS 5.4.1, but with some side effects with the introduction of a new command, which is enabled by default:
config global set hw-switch-ether-filter <enable | disable>
When the command is enabled:
- ARP (0x0806), IPv4 (0x0800), and VLAN (0x8100) packets are allowed l BPDUs are dropped and therefore no STP loop results l PPPoE packets are dropped l IPv6 packets are dropped l FortiSwitch devices are not discovered l HA may fail to form depending the network topology
When the command is disabled:
- All packet types are allowed, but depending on the network topology, an STP loop may result
FG-900D and FG-1000D
CAPWAP traffic will not offload if the ingress and egress traffic ports are on different NP6 chips. It will only offload if both ingress and egress ports belong to the same NP6 chip.
FG-3700DX
CAPWAP Tunnel over the GRE tunnel (CAPWAP + TP2 card) is not supported.
FortiGate units running 5.4.2 and managed by FortiManager 5.0 or 5.2
FortiGate units running 5.4.2 and managed by FortiManager 5.0.0 or 5.2.0 may report installation failures on newly created VDOMs, or after a factory reset of the FortiGate unit even after a retrieve and re-import policy.
FortiClient Support
Only FortiClient 5.4.1 and later is supported with FortiOS 5.4.1 and later. Upgrade managed FortiClients to 5.4.1 or later before upgrading FortiGate to 5.4.1 or later.
Note that the FortiClient license should be considered before upgrading.
Full featured FortiClient 5.2, and 5.4 licenses will carry over into FortiOS 5.4.1 and later. Depending on the environment needs, FortiClient EMS license may need to be purchased for endpoint provisioning. Please consult Fortinet Sales or your reseller for guidance on the appropriate licensing for your organization.
The perpetual FortiClient 5.0 license (including the 5.2 limited feature upgrade) will not carry over into FortiOS 5.4.1 and later. A new license will need to be procured for either FortiClient EMS or FortiGate. To verify if a license purchase is compatible with 5.4.1 and later, the SKU should begin with FC-10-C010
FortiClient (Mac OS X) SSL VPN Requirements
When using SSL VPN on Mac OS X 10.8, you must enable SSLv3 in FortiOS.
FortiGate-VM 5.4 for VMware ESXi
Upon upgrading to FortiOS 5.4.2, FortiGate-VM v5.4 for VMware ESXi (all models), no longer supports the VMXNET2 vNIC driver.
FortiClient Profile Changes
With introduction of the Cooperative Security Fabric in FortiOS v5.4.1, FortiClient profiles will be updated on FortiGate. FortiClient profiles and FortiGate are now primarily used for Endpoint Compliance, and FortiClient Enterprise Management Server (EMS) is now used for FortiClient deployment and provisioning.
In the FortiClient profile on FortiGate, when you set the Non-Compliance Action setting to Auto-Update, the FortiClient profile supports limited provisioning for FortiClient features related to compliance, such as AntiVirus, Web Filter, Vulnerability Scan, and Application Firewall. When you set the Non-Compliance Action setting to Block or Warn, you can also use FortiClient EMS to provision endpoints, if they require additional other features, such as VPN tunnels or other advanced options. For more information, see the FortiOS Handbook – Security Profiles.
When you upgrade to FortiOS 5.4.1 and later, the FortiClient provisioning capability will no longer be available in FortiClient profiles on FortiGate. FortiGate will be used for endpoint compliance and Cooperative Security Fabric integration, and FortiClient Enterprise Management Server (EMS) should be used for creating custom FortiClient installers as well as deploying and provisioning FortiClient on endpoints. For more information on licensing of EMS, contact your sales representative.
FortiPresence
FortiPresence users must change the FortiGate web administration TLS version in order to allow the connections on all versions of TLS. Use the following CLI command.
config system global set admin-https-ssl-versions tlsv1-0 tlsv1-1 tlsv1-2
end
Log Disk Usage
Users are able to toggle disk usage between Logging and WAN Optimization for single disk FortiGates.
To view a list of supported FortiGate models, refer to the FortiOS 5.4.0 Feature Platform Matrix.
SSL VPN setting page
The default server certificate has been changed to the Fortinet_Factory option. This excludes FortiGateVMs which remain at the self-signed option. For details on importing a CA signed certificate, please see the How to purchase and import a signed SSL certificate document.
Upgrade Information
Upgrading to FortiOS 5.4.2
FortiOS version 5.4.2 officially supports upgrading from version 5.4.0 and 5.2.7.
When upgrading from a firmware version beyond those mentioned in the Release Notes, a recommended guide for navigating the upgrade path can be found on the Fortinet documentation site.
There is separate version of the guide describing the safest upgrade path to the latest patch of each of the supported versions of the firmware. To upgrade to this build, go to FortiOS 5.4 Supported Upgrade Paths
Cooperative Security Fabric Upgrade
FortiOS 5.4.1 and later greatly increases the interoperability between other Fortinet products. This includes:
- FortiClient 5.4.1 and later l FortiClient EMS 1.0.1 and later l FortiAP 5.4.1 and later l FortiSwitch 3.4.2 and later
The upgrade of the firmware for each product must be completed in a precise order so the network connectivity is maintained without the need of manual steps. Customers must read the following two documents prior to upgrading any product in their network:
- Cooperative Security Fabric – Upgrade Guide
- FortiOS 5.4.x Upgrade Guide for Managed FortiSwitch Devices
This document is available in the Customer Support Firmware Images download directory for FortiSwitch 3.4.2.
Model-60D Boot Issue
The following 60D models have an issue upon upgrading to FortiOS 5.4.1. The second disk (flash) is unformatted and results in the /var/log/ directory being mounted to an incorrect partition used exclusively for storing the firmware image and booting.
- FG-60D-POE
- FG-60D
- FWF-60D-POE
- FWF-60D
To fix the problem:
If your FortiGate device is currently running FortiOS 5.2.7:
- Backup your configuration.
- Upgrade to 5.4.1 B5447.
If your FortiGate device is currently running FortiOS 5.4.0 or 5.4.1:
- Backup your configuration.
- Connect to the console port of the FortiGate device.
- Reboot the system and enter the BIOS menu.
- Burn the firmware image to the primary boot device.
- Once the system finishes rebooting, restore your configuration.
FortiClient Profiles
After upgrading from FortiOS 5.4.0 to 5.4.1, your FortiClient profiles will be changed to remove a number of options that are no longer supported. After upgrading you should review your FortiClient profiles to make sure they are configured appropriately for your requirements and either modify them if required or create new ones.
The following FortiClient Profile features are no longer supported by FortiOS 5.4.1:
- Advanced FortiClient profiles (XML configuration)
- Advanced configuration, such as configuring CA certificates, unregister option, FortiManager updates, dashboard
Banner, client-based logging when on-net, and Single Sign-on Mobility Agent l VPN provisioning l Advanced AntiVirus settings, such as Scheduled Scan, Scan with FortiSandbox, and Excluded Paths l Client-side web filtering when on-net
- iOS and Android configuration by using the FortiOS GUI
It is recommended that FortiClient Enterprise Management Server (EMS) should used for detailed Endpoint deployment and provisioning.
Unified Disk Usage
FortiOS 5.4.2 changes the disk usage behavior upon upgrading from FortiOS 5.2. The table below describes the new logging and WAN Optimization disk usage for single and two disk FortiGate devices running FortiOS 5.4.2.
Single Disk Platforms (Logging or WAN Optimization) |
Only Logging enabled No change. |
Only WAN Optimization No change. enabled |
Both Logging & WAN Disk is reserved for logging. If WAN Optimization Optimization enabled is configured, the WAN Optimization cache is lost. |
Two Disk Platforms (First disk reserved for Logging; second reserved for WAN Optimization) |
Only Logging enabled on No change.
the first disk |
Only Logging enabled on Logging is changed to the first disk. Logging data the second disk is lost on the second disk. |
Only WAN Optimization WAN Optimization is changed to the second disk. enabled on the first disk WAN Optimization cache is lost on the first disk. |
Only WAN Optimization Second disk reserved for WAN Optimization. First enabled on the second disk reserved for logging even when the log disk disk status CLI command is disabled: log-disk-
status=disable. |
Both Logging & WAN First disk reserved for logging. Second disk Optimization enabled reserved for WAN Optimization. |
FortiGate-VM 5.4 for VMware ESXi
Upon upgrading to FortiOS 5.4.2, FortiGate-VM v5.4 for VMware ESXi (all models), no longer supports the VMXNET2 vNIC driver.
Downgrading to previous firmware versions
Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings are retained:
- operation mode
- interface IP/management IP
- static route table
- DNS settings
- VDOM parameters/settings
- admin user account
- session helpers
- system access profiles.
When downgrading from 5.4 to 5.2, users will need to reformat the log disk.
Amazon AWS Enhanced Networking Compatibility Issue
Due to this new enhancement, there is a compatibility issue with older AWS VM versions. After downgrading a 5.4.1 or later image to an older version, network connectivity is lost. Since AWS does not provide console access, you cannot recover the downgraded image.
Downgrading to older versions from 5.4.1 or later running the enhanced nic driver is not allowed. The following AWS instances are affected:
- C3
- C4
- R3
- I2
- M4
- D2
FortiGate VM firmware
Fortinet provides FortiGate VM firmware images for the following virtual environments:
Citrix XenServer and Open Source XenServer
- .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
- .out.OpenXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains the QCOW2 file for Open Source XenServer.
- .out.CitrixXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.
Linux KVM
- .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
- .out.kvm.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains QCOW2 that can be used by qemu.
Microsoft Hyper-V
- .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
- .out.hyperv.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains three folders that can be imported by Hyper-V Manager on Hyper-V 2012. It also contains the file vhd in the Virtual Hard Disks folder that can be manually added to the Hyper-V Manager.
VMware ESX and ESXi
- .out: Download either the 64-bit firmware image to upgrade your existing FortiGate VM installation.
- .ovf.zip: Download either the 64-bit package for a new FortiGate VM installation. This package contains Open Virtualization Format (OVF) files for VMware and two Virtual Machine Disk Format (VMDK) files used by the OVF file during deployment.
Firmware image checksums
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support portal, https://support.fortinet.com. After logging in select Download > Firmware Image Checksums, enter the image file name including the extension, and select Get Checksum Code.
Product Integration and Support
FortiOS 5.4.2 support
The following table lists 5.4.2 product integration and support information:
Web Browsers l Microsoft Edge 25
Other web browsers may function correctly, but are not supported by Fortinet. |
Explicit Web Proxy Browser l Microsoft Edge 25
Other web browsers may function correctly, but are not supported by Fortinet. |
FortiManager For the latest information, see the FortiManagerand FortiOS
You should upgrade your FortiManager prior to upgrading the FortiGate. |
FortiAnalyzer For the latest information, see the FortiAnalyzerand FortiOS
You should upgrade your FortiAnalyzer prior to upgrading the FortiGate. |
FortiClient Microsoft Win- 5.4.1
dows and FortiClient Mac If FortiClient is being managed by a FortiGate, you must upgrade OS X FortiClient before upgrading the FortiGate. |
FortiClient iOS 5.4.1 |
FortiClient Android and 5.4.0
FortiClient VPN Android |
FortiOS 5.4.2 support
FortiAP | 5.4.1 5.2.5 and later
You should verify what the new FortiAP version is for your FortiAP prior to upgrading the FortiAP units. You can do this by going to the WiFi Controller > Managed Access Points > Managed FortiAP page in the GUI. Under the OS Version column you will see a message reading A recommended update is available for any FortiAP that is running an earlier version than what is recommended. FortiAP-421E and FortiAP-423E platforms only: Please call customer support for the FortiGate WiFi Controller image to manage these FortiAP models. |
FortiAP-S | 5.4.2 and later |
FortiSwitch OS (FortiLink support) | 3.4.2 and later |
FortiController | 5.2.0 and later
Supported models: FCTL-5103B, FCTL-5903C, FCTL-5913C, 5.0.3 and later Supported model: FCTL-5103B |
FortiSandbox | 2.1.0 and later , 1.4.0 and later |
Fortinet Single Sign-On (FSSO) | 5.0 build 0250 and later (needed for FSSO agent support OU in group filters)
Windows Server 2008 (32-bit and 64-bit) l Windows Server 2008 R2 64-bit, Windows Server 2012 Standard , Windows Server 2012 R2 Standard, Novell eDirectory 8.8 4.3 build 0164 (contact Support for download), Windows Server 2003 R2 (32-bit and 64-bit), Windows Server 2008 (32-bit and 64-bit), Windows Server 2008 R2 64-bit, Windows Server 2012 Standard Edition, Windows Server 2012 R2, Novell eDirectory 8.8 FSSO does not currently support IPv6. |
FortiExplorer | , 2.6 build 1083 and later.
Some FortiGate models may be supported on specific FortiExplorer versions. |
FortiExplorer iOS | 1.0.6 build 0130 and later
Some FortiGate models may be supported on specific FortiExplorer iOS versions. |
FortiExtender | 3.0.0
2.0.2 build 0011 and later |
AV Engine | 5.234 |
IPS Engine | 3.294 |
Virtualization Environments | |
Citrix | XenServer version 5.6 Service Pack 2, XenServer version 6.0 and later |
Linux KVM | RHEL 7.1/Ubuntu 12.04 and later, CentOS 6.4 (qemu 0.12.1) and later |
Microsoft | Hyper-V Server 2008 R2, 2012, and 2012 R2 |
Open Source | XenServer version 3.4.3, XenServer version 4.1 and later |
VMware | ESX versions 4.0 and 4.1
ESXi versions 4.0, 4.1, 5.0, 5.1, 5.5 and 6.0 |
VM Series – SR-IOV | The following NIC chipset cards are supported:
Intel 82599 ,Intel X540,Intel X710/XL710 |
Language support
The following table lists language support information.
SSL VPN support
Language support
Language | GUI |
English | ✔ |
Chinese (Simplified) | ✔ |
Chinese (Traditional) | ✔ |
French | ✔ |
Japanese | ✔ |
Korean | ✔ |
Portuguese (Brazil) | ✔ |
Spanish (Spain) | ✔ |
SSL VPN support
SSL VPN standalone client
The following table lists SSL VPN tunnel client standalone installer for the following operating systems.
Operating system and installers
Operating System | Installer |
Microsoft Windows XP SP3 (32-bit)
Microsoft Windows 7 (32-bit & 64-bit) Microsoft Windows 8 (32-bit & 64-bit) Microsoft Windows 8.1 (32-bit & 64-bit) |
2329 |
Microsoft Windows 10 (32-bit & 64-bit) | 2329 |
Linux CentOS 6.5 (32-bit & 64-bit) Linux Ubuntu 12.0.4 (32-bit & 64-bit) | 2329 |
Virtual Desktop for Microsoft Windows 7 SP1 (32-bit) | 2329 |
Other operating systems may function correctly, but are not supported by Fortinet.
Product Integration and Support SSL VPN support
SSL VPN web mode
The following table lists the operating systems and web browsers supported by SSL VPN web mode.
Supported operating systems and web browsers
Operating System | Web Browser |
Microsoft Windows 7 SP1 (32-bit/64-bit) | Microsoft Internet Explorer version 11 Mozilla Firefox version 46 |
Microsoft Windows 8/8.1 (32-bit/64-bit) | Microsoft Internet Explorer version 11 Mozilla Firefox version 46 |
Mac OS 10.9 | Safari 7 |
Linux CentOS version 6.5 | Mozilla Firefox version 46 |
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
SSL VPN host compatibility list
The following table lists the antivirus and firewall client software packages that are supported.
Supported Microsoft Windows XP antivirus and firewall software
Product | Antivirus | Firewall |
Symantec Endpoint Protection 11 | ✔ | ✔ |
Kaspersky Antivirus 2009 | ✔ | |
McAfee Security Center 8.1 | ✔ | ✔ |
Trend Micro Internet Security Pro | ✔ | ✔ |
F-Secure Internet Security 2009 | ✔ | ✔ |
Supported Microsoft Windows 7 32-bit antivirus and firewall software
Product | Antivirus | Firewall |
CA Internet Security Suite Plus Software | ✔ | ✔ |
AVG Internet Security 2011 | ||
F-Secure Internet Security 2011 | ✔ | ✔ |
SSL VPN support
Product | Antivirus | Firewall |
Kaspersky Internet Security 2011 | ✔ | ✔ |
McAfee Internet Security 2011 | ✔ | ✔ |
Norton 360™ Version 4.0 | ✔ | ✔ |
Norton™ Internet Security 2011 | ✔ | ✔ |
Panda Internet Security 2011 | ✔ | ✔ |
Sophos Security Suite | ✔ | ✔ |
Trend Micro Titanium Internet Security | ✔ | ✔ |
ZoneAlarm Security Suite | ✔ | ✔ |
Symantec Endpoint Protection Small Business Edition 12.0 | ✔ | ✔ |
Resolved Issues
The following issues have been fixed in version 5.4.2. For inquires about a particular bug, please contact CustomerService & Support.
FortiGate-60D
Bug ID | Description |
372629 | Hardware issue of FG-60D cause config lost |
FortiGate-80D
Bug ID | Description |
373153 | FG-80D should support jumbo frame on new kernel |
376656 | FG-80D change port speed does not take effect |
FortiGate-500D
Bug ID | Description |
371098 | VLAN counters match physical port if NP6 offloading is disabled |
FortiGate-800D
Bug ID | Description |
365101 | Fail IQC traffic test, all blocking at port8 for ip connection |
FortiGate-1500D
Bug ID | Description |
386683 | Kernel panics after roughly 24 hours uptime |
388646 | FG-1500D: hardware test CPU/Memory test fail |
370151 | CPU doesn’t remove dirty flag when returns session back to NP6 |
295041 | Destination MAC address on NP6 offloaded IPv6 sessions are not updated when neighbor MAC changes |
FortiGate-3600D
Bug ID | Description |
385669 | FG-3000D crash with kernel panic |
FortiGate-3810D
Bug ID | Description |
375749 | Sometimes NP6 gets np6_fos_ipsec_sa_install 746 npu_tunnel_idx doesn’t match error message |
FortiLink
Bug ID | Description |
379098 | FortiLink Switch-Controller: Support “edge-port” setting for managed switch ports |
380919 | EAP tunnel is terminated at Authenticator(FGT) instead of at Auth-Server |
387398 | no admin password on Fortilink managed switch |
FortiView
Bug ID | Description |
375394 | Httpsd crashes when accessing page of Fortiview>VPN in GUI |
390105 | Fortiview VPN page shows minus value in field “Bytes(sent/received)” for L2TP and PPTP tunnels |
FOC
Bug ID | Description |
382343 | GTPV2 – Create Session response message denied due to ‘ie-is-missing’ |
GUI
Bug ID | Description |
371106 | Removed trusted host is not re-indexed but replaced with 0.0.0.0/0. |
371904 | GUI does not prevent upgrading invalid CC signature image in FIPS mode. |
Bug ID | Description |
375255 | Cannot quarantine FortiClient device on FortiView because of javascript error from trunk 5x. |
288896 | Should fall back to non-paging search if Oracle ODSEE 11.1 LDAP returns LDAP_ UNAVAILABLE_CRITICAL_EXTENSION. |
390088 | Contract registration should accept characters. |
390794 | Fix fail to create IPsec IKEv2 custom VPN tunnel with authmethod psk in GUI. |
374221 | SSLVPN setting portal mapping realm field misses the “/” option. |
374339 | SSLVPN setting page may not check the required fields. |
386862 | Large lists of address objects can take a considerable amount of time to load |
292615 | VLAN interface based on NPU vdom link can’t be displayed in vdom-network-interface page |
370360 | VDOM read-only admin can view super admin and other higher priviledge admin’s password hash via REST API and direct URL |
373031 | Unable to view FortiToken CD (FTK211) on FortiGate WebU |
378817 | Traffic Shapers list priority should display text word not number |
391703 | Add video links to FortiOS GUI |
377539 | Filter Overrides is removed after clicking on Apply on the Application Control profile |
FortiSwitch Controller
Bug ID | Description |
388436 | Traffic is intermittently blocked when HA FortiGate controls FSW by split interface. |
387555 | VLAN switch trunk function stops working |
System
Bug ID | Description |
369540 | Kills the parent process (fgfmsd) and causes script exec reboot from FMG does not work on FortiGate. |
372629 | Hardware issue of FG-60D causes config to be lost. |
375188 | After factoryreset2, split port interfaces are lost. |
Bug ID | Description |
375141 | When NP6 offload is enabled, traffic will show up in wrong VDOM but correct VLAN interface. |
380157 | ZebOS issues on new VDOM. |
385362 | Remove username and password requirement for CLI exec central-mgmt register-device FMGSN KEY username password. |
367471 | Fragmented out-of-sequence ICMP Reply can loop endlessly in npu-vlink. |
385455 | Inconsistent trustedhost behavior. |
381857 | LACP passive mode voluntarily initiate LACP negotiation then aggregate interfaces unexpected establishing. |
374481 | Alertmail does not work on CHANGED management VDOM. |
384698 | Cache memory increased abruptly. |
390570 | FEXT discovery issue fixed. |
390592 | Update geoip database to version 1.057. |
387675 | ARP-Reply packets drops in NP6. |
376452
385278 |
ICMP packets with HBH options are now forwarded properly. |
389194 | End of Daylight Savings (DST) timezone Turkey/Istanbul GMT +3. |
371387 | Add two trailers for FK images, to make it pass the upgrade test. |
381675 | Support SNMP query for individual CPU Core monitoring in kernel-3.2. |
390207 | Fix ixgbevf driver VLAN issue. |
292237 | FG-200D hangs with transmit timeouts. |
378761 | Allow local-in traffic When system memory reaches 94%. |
378558
380653 |
LACP over Virtual Wire Pair on 800C, ports not forwarding LACPDUs. |
372632 | Eliminate kernel crash and reboots while FortiManager pushes config changes. |
356245 | Fix LACP ignoring peer ID change. |
380161 | No reply to SNMP queries if reply should be routed via PBR. |
Bug ID | Description |
374715 | Add TCP seqnum verification to BGP on RST packets. |
302021 | Enable FortiTest feature for 400D/600D platforms. |
378825
385964 |
Enable diagnose hardware test on FG-100D/800D and fix related bugs. |
389047 | Unable to edit/create system interface when a large number of detected devices exist has been fixed. |
370778 | Connection problem to new master FQDN address of FMG after failover. |
386478 | Add LFG60C B0735 (LENC) device failed with internal error. |
375338 | FortiManager with super_admin profile install capture-packet meet privilege issue. |
373344 | “diag ip address list” still show ip address although dhcp lease time expired |
376144 | FMG failed to change FGT HA slave to master |
380600 | CLI configurable NP6 optimization |
388603 | after reassembly fragmented UDP packet, the s/d port become 0 |
365441 | FGT is showing capwap IP (224.0.1.140) and mac-address (01:00:5e:00:01:8c) even no capwap enable on the port |
369353 | Destination MAC address will not be updated for NPU offloaded IPv4 sessions sometimes. |
Tablesize
Bug ID | Description |
382232 | FG-900D explicit proxy max users < FG-800D. |
390053 | Increase firewall.schedule limits on higher end |
Router
Bug ID | Description |
369864 | BFD is DOWN randomly. |
381974,
387318 |
Default static router setting should use port1. |
Bug ID | Description |
382934 | gpd may crash after executing get router info bgp route-map. |
381908 | Asymmetric routing in transparent VDOM has to be enabled for correct packet flow after upgrade from 5.2. |
373820 | Update route_cache only when there are changes in route table. |
307530,
378075 |
Added support for BGP Local-AS feature. |
391240 | BGP UPDATES without NEXT_HOP |
376765 | E models cannot establish BGP session with Non-ARM platforms when MD5 password authentication enabled |
391233 | Multicast router doesn’t send the PIM register after upgrading from 5.2.7 to 5.4.1 |
WiFi
Bug ID | Description |
387163 | Fix WiFi driver crash for 3.2 kernel FWF platforms. |
371374 | Add back support of wave2 FAP421E/423E. |
376921 | FortiGate kills cw_acd daemon continuously in 900+ APs large setup. |
365255,
381030 |
WPA-Personal passphrase should support a fixed-length of 64 hexadecimal digits. |
387163 | Fix WiFi driver crash for 3.2 kernel FWF platforms. |
309597 | Fix WiFi region codes and DFS support. |
374617 | Memory leak happens when change large WTP sessions’s security option. |
370657 | FDS daemon should return error code when fortiap version is not available in FAPV |
374385 | Fortinet_WiFi is not signed by PositiveSSL_CA/Fortinet_WiFi_CA after LENC license is loaded |
387163 | FWF30E / kernel error happpened when purge vap interface by CLI |
AV
Bug ID | Description |
373804 | Encounter several scanunit daemon crash on US WiFi corp firewall. |
384520 | 3600C crash on scanunit signal 11 (Segmentation fault) |
DLP
Bug ID | Description |
369825 | Do not compare DLP filesize filter for files inside an archive. |
IPS
Bug ID | Description | |
371254 | ipsengine signal 11 crash happens on FG-60D/90D when IPS custom signature is detected. | |
378192 | Per-IP shaper is not working for Application Category. | |
381547 | Fix SynProxy offloading issue. | |
369137 | IPSec performance decreased after upgraded FG-100D from V5.2.5 to V5.4.0 in certain test. | |
302853 | Unnecessary debug message print out when change certain ips config. | |
379275 | Fix FortiOS memory corruption caused by ips engine crash. | |
378252 | Flow UTM: Save last session info into crash log when IPS engine crash happens. | |
379833 | Adjust IPS CPU assignment to improve 3815D performance. | |
383525 | Fix for IPsec mesh selectors not automatically brought up when phase2 auto-negotiate enabled. | |
379082 | Proxyworker high CPU waiting for IPS to reinitialize. | |
389610 | IPS app id/cat id should be datasrc and the cat id list source is inaccurate. | |
368729 | State preservation test failed at max mem – attack packet not blocked | |
386050 | WAD daemon consumes 99.8% CPU utilization | |
300785 | Enabling sync-session-ttl will cause the existing IPS sessions to be removed | |
Bug ID | Description | |
379084 | Botnet DB update shouldn’t cause IPS/AppCtrl signature reload in CMDB | |
386271 | After enabling IPS sensor with custom sig, in 60% chance need to wait for 30+ seconds to let ping packet pass | |
392520 | Update IPS engine to build 3.294 | |
Web Filter
Bug ID | Description |
378234 | WAD crash in wad_fmem_free after upgrade to 5.4.1. |
388731 | Fix rpc-over-http will cause WAD crash when enable UUID is not found in RTS. |
382501 | Kerberos authentication fails with unexpected token length error. |
376486 | WAD not supporting full webfilter with transparent policy and external webproxy in SSL deepscan mode. |
373251 | Local FortiGuard overrided rating sometimes doesn’t work well. |
380119 | Webfilter Static URL filter blocking domains with similar name. |
377206 | Fix wanopt log incorrect and wad ntlm auth crash. |
390446 | Fix webfilter urlfilter mismatch. |
380324
380682 |
Fix proxyd and wad ssl related issues. |
388957 | Fix YouTube EDU filter: None, Moderate, Strict. |
393381 | Suggest add webfilter profile fgd block and override config CLI correlation check |
DNS Filter
Bug ID | Description |
390957 | Make DNS filter available under flow-inspection mode has been fixed. |
SSLVPN | |
Bug ID | Description |
386167 | Proxy vdom SSLVPN IPv6 av doesn’t block virus if IPv4 policy UTM disable. |
Bug ID | Description |
381112 | Website drop-down menu does not work when accessed via SSLVPN bookmark. |
371933 | Unable to connect to SMB server which supports only NTLMv2. |
371597 | SSLVPN fail to login FGT 5.4 bookmark through Fortinet bar with url-obscuration enable. |
371551 | Fix SSLVPN user authenticates doesn’t follow firewall policy order when change user group order until reboot. |
371807 | Try next server when LDAP group auth failed on first firewall policy. |
377207 | fix could not access owncloud properly through SSLVPN. |
377557 | Change tunnel set-up timeout threshold for SSLVPN web portal with limit-userlogins. |
382586 | Fixed path not found is printed out when certificate is changed. |
384200 | Fix SSLVPN tunnel sometimes gets disconnected without error message. |
374859 | Fix got fork() failed after SSLVPN enter conserve mode. |
379450 | Fix SSLVPN crash with segmentation fault in sslvpn_ap_table_get after upgrading to 5.4.1. |
379076 | RDP session will be disconnected after the idle-timeout is expired on web-portal. |
378103 | Fix SSLVPN/newcli crash when running get vpn ssl monitor if there are more than 10000 tunnels. |
380201
382393 |
Fixed SSLVPN has high CPU/crashed. |
375561 | RESOURCE_LEAK found in SSLVPN. |
386968 | Getting error Failed, suspended by other users when edit some content using Firefox. |
379076 | RDP session will be disconnected after the idle-timeout is expired on web-portal. |
382828 | SSLVPN web-mode not displaying login page of internal server, but tunnel-mode is OK. |
355913 | SSLVPN setting -> edit authentication/portal mapping page issue |
387966 | Username replaced by peer name in certificate based SSLVPN |
Bug ID | Description |
375379 | Username and password are displayed in clear text in the browser bar for CIFS/SMB SSL VPN Bookmark |
IPsecVPN
Bug ID | Description |
376779 | The algorithm names sha384 and sha512 are not displayed in the output of get commands for ipsec tunnel. |
375749, 382568 | Fix TPE_SHAPER drop on NP6 and an IPsec issue on FG-3810D. |
383935 | Policy-based routes does not work for Dialup IPSec routes in Fortios5.4.1. |
376340 | Change vpn ipsec phase1/phase1-interface peertype default from ‘any’ to ‘peer’ |
388408 | Incorrect output for “get vpn ipsec stats crypto” |
Web Application Firewall
Bug ID | Description |
378194 | Suspect WAF breaks JSON file by adding zero to the end. |
383520 | WAF url-access not work. |
Certification
Bug ID | Description |
365586 | Need to restart fnbamd to load import CRL. |
373930 | Unset ssh-certificate can not allow client to access with null password. |
WebProxy
Bug ID | Description | |
384581 | Explicit Proxy Signing Certificate for replacement pages resets to default. | |
374706 | Fix a memory leak on proxyd. | |
380324 | Transparent Proxy SSL Inspection closes connections before completion of SSL negotiation and/or complains of Bad Record. | |
Bug ID | Description | |
389059 | Improve SOCKS debug and WAF&AV scan on HTTP request. | |
381429 | CP8 does not work for Proxy SSL acceleration. | |
378518 | Fix WAD will crash when using web-proxy profile to add/remove HTTP headers. | |
390124
391748 |
Fix WAD SSL session ticket will cause crash on hello request, and add cert status extension support to fts. | |
371991 | YouTube_Video.Play is not recognized with HTTPS in Application control Override. | |
Visibility
Bug ID | Description |
365259 | src-vis crash on device with device detection eanbled on one-arm-sniffer interface |
Bug ID | Description |
386446 | tunnelip shouldn’t be shown if no tunnel IP in the log. |
VM
Bug ID | Description |
372030 | Increase VM00 memory limit to 1.5G. |
376567 | Fix network reachability issue of AWS instance launched from customer created ami. |
372040 | VLAN not forward traffic out on non-root VDOM. |
374905 | Error when attempting to deploy vApp on ESXi v6.0.0. |
372487 | Fix FG-VM stuck at rebooting the system when its rebooting. |
378482 | TCP/UDP traffic failing when NAT/UTM is enabled on FG-VM in KVM. |
369167
391519 |
Improve cloudinit boot up config sequence. |
371982 | Fix FG-VM have no gui-wanopt. |
392654 | IPv6 basic network settings not available on unlicense VM01 or higher |
Log
Bug ID | Description |
376157 | Logging performance improvement for IPS/AppCtrl. |
284055 | Improve the antispam log fortiguardresp log field. |
377928 | FortiCloud report can’t be displayed on low-end platforms without SSD after burn image |
373083 | Broken remote log capabilities when resolve-ip is enabled |
WANOPT
Bug ID | Description |
373825
376035 |
Fix Traffic was broken over A-P mode WANOPT on first attempt after WAD restarted. |
393114 | WAD crash in wad_str_copy_str after upgrade to 5.4.1 |
HA
Bug ID | Description |
387212 | HA gets out of sync frequently and hasync becomes zombie. |
385999 | Log backup of execute backup disk xxx feature does not work fine on HA master unit. |
374418 | No safe method for modifying secondary vcluster membership via the CLI. |
266261 | FortiExtender interface unable to get DHCP IP on a FortiGate in HA mode. |
301101 | hasync process is running 100% of CPU. |
389192 | Can’t forward the SIP traffics(200OK messages) asymmetrical traffic environment in FGSP. |
368447 | FGSP should not sync static BFD setting. |
375678 | update-all-session-timer partially broken. |
376449 | FGSP: FGT1 clears SCTP Multihomed session marked established while data traffic is going through secondary path. |
378213 | FGSP: after a reboot of the FortiGate that holds the SCTP secondary path, this session is missing and will be reopened. |
390929 | hatalk crashed when set standaone-config-sync from enable to disable. |
Bug ID | Description |
376045 | Software switch can’t authorize FSWS successfully in HA scenario. |
390926 | After downgrade from b1086, HA can’t be synced. |
382364 | Correct typo error in HA setting (change helo-holddown to hello-holddown). |
FSSO
Bug ID | Description |
386021 | FSSO local poller fails on some X86 32 platform. |
Firewall
Bug ID | Description |
376284 | Fix CLI firewall.addrgrp when contain url upgrade from 5.2 to 5.4. |
387367 | Firewall is rebooting automatically. |
373667 | High vsd memory usage always triggers entering conserve mode when downloading file in SSL offload + IPS inspection. |
368838 | active-flow-timeout does not take effect for HTTP protocol when NP6 offloaded. |
385983 | ssl-http-location-conversion setting change from enable to disable by rebooting FortiGate. |
375897 | Sniffer policy upgrade from b0718 to b1064 failed. |
383783 | policy64 and policy46 ID should not use special id:4294967295. |
297421 | Fix policy re-push for multiple VDOMs. |
297387
378560 |
On some platforms, UDP throughput is lower with more number of policies. |
FIPS-CC
Bug ID | Description |
380703 | Generation of IKE v2 nonces – NDcPP requirement. |
375098 | Remove CC error mode. |
375102 | Modify low level format for boot device (flash) in FIPS-CC mode. |
Bug ID | Description |
375099 | Update supported TLS cipher suites in FIPS-CC mode. |
376860 | IPSec ESP SA with stronger encryption than IKE SA shouldn’t be allowed. |
387002 | Add HMAC SHA-384/512 self-tests. |
375100 | Update supported SSH cipher suites in FIPS-CC mode. |
387542 | Remove CRL/Ceritifcate/CA may cause FIPS-CC self-test failure. |
389003 | FIPS-CC get self-test failure causes of /etc/cert/ca/ changes, which causes system halt. |
388181 | Add support to break RNG health tests |
FortiCloud
Bug ID | Description |
380506 | FortiGate’s forticldd daemon timer settings and updated timer discussion. |
Upgrade | |
Bug ID | Description |
393056 | Explicit proxy config lost on interfaces after upgrading if vdom is enabled |
VOIP
Bug ID | Description |
370201 | Fix the imd crash issue when unregistering SIP with asterisk (*) contact, or multiple REGISTER message with same AOR and multiple contacts. |
382315 | Fix the issue that SIP re-invites causing excessive memory consumption in VOIPD. |
Common Vulnerabilities and Exposures
Bug ID | Description |
379870 | FortiOS 5.4.2 is no longer vulnerable to the following CVE References: l 2003-1418 l 2007-6750
Visit https://fortiguard.com/psirt for more information. |
Bug ID | Description |
373707 | FortiOS 5.4.2 is no longer vulnerable to the following CVE References: l 2016-1551 l 2016-1549 l 2016-2516 l 2016-2517 l 2016-2518 l 2016-2519 l 2016-1547 l 2016-1548 l 2015-7704 l 2015-8138 l 2016-1550
Visit https://fortiguard.com/psirt for more information. |
383538 | FortiOS 5.4.2 is no longer vulnerable to the following CVE References: l 2016-3713 l 2016-5829
Visit https://fortiguard.com/psirt for more information. |
381168 | FortiOS 5.4.2 is no longer vulnerable to the following CVE Reference: l 2004-0230
Visit https://fortiguard.com/psirt for more information. |
378697 | FortiOS 5.4.2 is no longer vulnerable to the following CVE Reference: l 2016-2512
Visit https://fortiguard.com/psirt for more information. |
383564 | FortiOS 5.4.2 is no longer vulnerable to the following CVE Reference: l 2016-5696
Visit https://fortiguard.com/psirt for more information. |
Bug ID | Description |
372770 | FortiOS 5.4.2 is no longer vulnerable to the following CVE References: l 2016-6304 l 2016-6305 l 2016-2183 l 2016-6303 l 2016-6302 l 2016-2182 l 2016-2180 l 2016-2177 l 2015-2178 l 2015-2179 l 2016-2181 l 2016-6306 l 2016-6307 l 2016-6308
Visit https://fortiguard.com/psirt for more information. |
389610 | FortiOS 5.4.2 is no longer vulnerable to the following CVE References: l 2016-6309 l 2016-7052
Visit https://fortiguard.com/psirt for more information. |
Known Issues
The following issues have been identified in version 5.4.2. For inquires about a particular bug or to report a bug, please contact CustomerService & Support.
AntiVirus
Bug ID | Description |
374969 | FortiSandbox FortiView may not correctly parse the FSA v2.21 tracer file(.json) |
Bug ID | Description |
392049 | Cannot create the second IPv6 VIP which has the same ext/int IP as the existing one, but different port-forwarding port. |
364589 | LB VIP slow access when cookie persistence is enabled. |
DLP
Bug ID | Description |
393649 | Executable files may not be blocked by DLP built-in exe file-type filter. |
379911 | DLP filter order is not applied on encrypted files. |
Endpoint Control
Bug ID | Description |
375149 | FGT does not auto update AV signature version while Endpoint Control is enabled. |
374855 | Third party compliance may not be reported if FortiClient has no AV feature. |
391537 | Buffer size is too small when sending a large vulnerability list to FortiGate. |
FIPS-CC
Bug ID | Description |
375149 | NDcPP requires a SSH server rekey. |
Firewall
FortiGate-3815D
Bug ID | Description |
385860 | FG-3815D does not support 1GE SFP transceivers. |
FortiRugged-60D
Bug ID | Description |
375246 | invalid hbdev dmz may be received if the default hbdev is used. |
357360 | DHCP snooping does not work on IPv6. |
374346 | Adding or reducing stacking connections may block traffic for 20 seconds. |
FortiSwitch
Bug ID | Description |
393966 | Trunk port does not work if the only VLAN member is on PoE interfaces. |
FortiSwitch-Controller/FortiLink
Bug ID | Description |
369099 | FortiSwitch authorizes successfully, but fails to pass traffic until you reboot FortiSwitch. |
357360 | DHCP snooping may not work on IPv6. |
304199 | Using HA with FortiLink can encounter traffic loss during failover. |
FortiView
Bug ID | Description | |
289376 | Applying the filter All by using the right click method may not work in the All Sessions page. | |
303940 | Web Site > Security Action filter may not work. | |
373142 | Threat: Filter result may not be correct when adding a filter on a threat and threat type on the first level. | |
366627 | FortiView Cloud Application my display the incorrect drill down File and Session list in the Applications View. | |
374947 | FortiView may show empty country in the IPv6 traffic because country info is missing in log. | |
Bug ID | Description | |
372350 | Threat view: Threat Type and Event information are missing in the last level of the threat view. | |
375187 | Using realtime auto update may increase chrome browser memory usage. | |
368644 | Physical Topology: Physical Connection of stacked FortiSwitch may be incorrect. | |
375172 | FortiGate under a FortiSwitch may be shown directly connected to an upstream FortiGate. | |
372897 | Invalid -4 and invalid 254 is shown as the submitted file status. | |
GUI
Bug ID | Description |
289297 | Threat map may not be fully displayed when screen resolution is not big enough. |
303928 | After upgrading from 5.2 to 5.4, the default flow based AV profile may not be visible or selectable in the Firewall policy page in the GUI. |
374166 | Using Edge cannot select the firewall address when configuring a static route. |
365223 | CSF: downstream FGT may be shown twice when it uses hardware switch to connect upstream. |
373546 | Only 50 security logs may be displayed in the Log Details pane when more than 50 are triggered. |
375383 | Policy list page may receive a js error when clicking the search box if the policy includes wan-load-balance interface. |
375369 | May not be able to change IPsec manualkey config in GUI. |
374363 | Selecting Connect to CLI from managed FAP context menu may not connect to FortiAP. |
374521 | Unable to Revert revisions on GUI. |
374081 | wan-load-balance interface may be shown in the address associated interface list. |
355388 | The Select window for remote server in remote user group may not work as expected. |
373363 | Multicast policy interface may list the wan-load-balance interface. |
372943 | Explicit proxy policy may show a blank for default authentication method. |
375346 | You may not be able to download the application control packet capture from the forward traffic log. |
Bug ID | Description |
375290 | Fortinet Bar may not be displayed properly. |
374224 | The Ominiselect widget and Tooltip keep loading when clicking a newly created object in the Firewall Policy page. |
374322 | Interfaces page may display the wrong MAC Address for the hardware switch. |
374247 | GUI list may list another VDOM interface when editing a redundant interface. |
374320 | Editing a user from the Policy list page may re-direct to an empty user edit page. |
375036 | The Archived Data in the Sniffer Traffic log may not display detailed content and download. |
374397 | Should only list any as destination interface when creating an explicit proxy in the TP VDOM. |
374221 | SS LVPN setting portal mapping realm field misses the / option. |
372908 | The interface tooltip keeps loading the VLAN interface when its physical interface is in another VDOM. |
374162 | GUI may show the modem status as Active in the Monitor page after setting the modem to disable. |
375227 | You may be able to open the dropdown box and add new profiles even though it errors occur when editing a Firewall Policy page. |
375259 | Addrgrp editing page receives a js error if addrgrp contains another group object. |
374343 | After enable inspect-all in ssl-ssh-profile, user may not be able to modify allow-invalid-server-cert from GUI |
372825 | If the selected SSID has reached the maximum entry, the GUI will reset the previously selected SSID. |
374191 | The Interface may be hidden from the Physical list if its VLAN interface is a ZONE member in the GUI. |
374525 | When activating the FortiCloud/Register-FortiGate clicking OK may not work the first time. |
374350 | Field pre-shared key may be unavailable when editing the IPsec dialup tunnel created through the VPN wizard |
374371 | The IPS Predefined Signature information popup window may not be displayed because it is hidden behind the Add Signature window. |
Bug ID | Description |
374183 | Security page does not have details for the Forward Traffic log for an IPS attack when displaying a FortiAnalyzer log. |
374538 | Unable to enable Upload logs to FortiAnalyzer after disabling it. |
374373 | Policy View: Filter bar may display the IPv4 policy name for the IPv6 policy. |
365378 | You may not be able to assign ha-mgmt-interface IP address in the same subnet as another port from the GUI. |
374237 | You may not be able to set a custom NTP server in the GUI if you did not config it in the CLI first. |
393927 | Policy List > FQDN Object Tooltip should show resolved IP addresses. |
393267 | Not possible to edit existing Web Filter profile. |
297832 | Administrator with read-write permission for Firewall Configuration is not able to read or write firewall policies. |
283682 | Cannot delete FSSO-polling AD group from LDAP list tree window in FSSO-user GUI. |
365317 | Unable to add new AD group in second FSSO local polling agent. |
HA
Bug ID | Description |
387216 | HA virtual MAC is flapping. |
391084 | HA unable to sync inversed object entries. |
388044 | Four member HA Cluster do not always re-converge properly when HB links are re-established. |
IPS
Bug ID | Description |
393675 | SSH due to Application Control Proxy in the Security Profile. |
393958 | Shellshock attack succeeds when FGT is configured with server-cert-mode replace and an attacker uses rsa_3des_sha. |
394157 | IPS archive not uploaded to FAZ when it is in realtime mode. |
IPSec
Bug ID | Description |
375020 | IPsec tunnel Fortinet bar may not be displayed properly. |
374326 | Accept type: Any peer ID may be unavailable when creating a IPsec dialup tunnel with a pre-shared key and ikev1 in main mode. |
Logging & Report
Bug ID | Description |
300637 | MUDB logs may display Unknown in the Attack Name field under UTM logs. |
374103 | Botnet detection events are not listed in the Learning Report. |
367247 | FortiSwitch log may not show the details in the GUI, while in CLI the details are displayed. |
374411 | Local and Learning report web usage may only report data for outgoing traffic. |
391786 | Logdiskless FGT does not generate a log indicating a sandboxing result. |
377733 | Results/Deny All filter does not return all required/expected data. |
Router
Bug ID | Description |
393127 | WLB measured-volume-based load balance does not work as expected after running for more than one day. |
393623 | Policy routing change not is not reflected. |
385264 | AS-override has not been applied in multihop AS path condition. |
SSL VPN
Bug ID | Description | |
304528 | SSL VPN Web Mode PKI user might immediately log back in even after logging out. | |
303661 | The Start Tunnel feature may have been removed. | |
375137 | SSL VPN bookmarks may be accessible after accessing more than ten bookmarks in web mode. | |
374644 | SSL VPN tunnel mode Fortinetbar may not be displayed. | |
Bug ID | Description | |
393698 | SSL VPN web mode http/https SSO will keep trying even if the password is wrong. | |
307465 | Fail to Copy & Paste through RDP when connected by SSL VPN web mode. | |
393943 | SSL VPN crash when connect to win2008 smb/CIFS bookmark with wrong password. | |
System
Bug ID | Description |
304199 | FortiLink traffic is lost in HA mode. |
295292 | If private-data-encryption is enabled, when restoring config to a FortiGate, the FortiGate may not prompt the user to enter the key. |
290708 | nturbo may not support CAPWAP traffic. |
372717 | Unable to access FortiGate GUI via https using low ciphers. |
364280 | User can not use ssh-dss algorithm to login to FortiGate via SSH. |
371320 | show system interface may not show the Port list in sequential order. |
372717 | admin-https-banned-cipher in sys global may not work as expected. |
371986 | NP6 may have issue handling fragment packets. |
287612 | Span function of software switch may not work on FortiGate-51E/FortiGate-30E. |
355256 | After reassigning a hardware switch to a TP-mode VDOM, bridge table does not learn MAC addresses until after a reboot. |
388046 | Confsyncd memory leak. |
393395 | The role of new VAP interface should be set as LAN. |
393042 | IPv6 traffic not distributed according to the lacp L4 algorithm. |
393343 | Remove botnet filter option if interface role is set to LAN. |
392960 | FOS support for V4 BIOS. |
392125 | FGT to FMG backup config returned with the Management server is not configured error message. |
392125 | After an HA failover some of the multicast streams stop. |
Upgrade
Bug ID | Description |
269799 | sniffer config may be lost after upgrade. |
Visibility
Bug ID | Description |
374138 | FortiGate device with VIP configured may be put under Router/NAT devices because of an address change. |
VM
Bug ID | Description |
364280 | ssh-dss may not work on FGT-VM-LENC. |
378421 | Committing any change on SSL VPN Settings over web page returns error:500. |
Limitations
Citrix XenServer limitations
The following limitations apply to Citrix XenServer installations:
- XenTools installation is not supported.
- FortiGate-VM can be imported or deployed in only the following three formats:
- XVA (recommended) l VHD l OVF
- The XVA format comes pre-configured with default configurations for VM name, virtual CPU, memory, and virtual NIC. Other formats will require manual configuration before the first power on process.
Open Source XenServer limitations
When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may arise when using the QCOW2 format and existing HDA issues.