0% found this document useful (0 votes)
90 views

Fortios v6.0.12 Release Notes

Uploaded by

Mithun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
90 views

Fortios v6.0.12 Release Notes

Uploaded by

Mithun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

FortiOS - Release Notes

Version 6.0.12
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com

FORTINET VIDEO GUIDE


https://video.fortinet.com

FORTINET BLOG
https://blog.fortinet.com

CUSTOMER SERVICE & SUPPORT


https://support.fortinet.com

FORTINET TRAINING & CERTIFICATION PROGRAM


https://www.fortinet.com/support-and-training/training.html

NSE INSTITUTE
https://training.fortinet.com

FORTIGUARD CENTER
https://www.fortiguard.com

END USER LICENSE AGREEMENT


https://www.fortinet.com/doc/legal/EULA.pdf

FEEDBACK
Email: [email protected]

April 30, 2021


FortiOS 6.0.12 Release Notes
01-6011-680959-20210430
TABLE OF CONTENTS

Change Log 5
Introduction 6
Supported models 6
Special branch supported models 7
Special Notices 8
WAN optimization and web caching functions 8
FortiGuard Security Rating Service 8
Using FortiManager as a FortiGuard server 9
Built-in certificate 9
FortiGate and FortiWiFi-92D hardware limitation 9
FG-900D and FG-1000D 10
FortiClient (Mac OS X) SSL VPN requirements 10
FortiClient profile changes 10
Use of dedicated management interfaces (mgmt1 and mgmt2) 10
Using FortiAnalyzer units running older versions 10
L2TP over IPsec on certain mobile devices 11
Upgrade Information 12
FortiGuard protocol and port number 12
Fortinet Security Fabric upgrade 12
Minimum version of TLS services automatically changed 13
Downgrading to previous firmware versions 13
Amazon AWS enhanced networking compatibility issue 14
FortiGate VM firmware 14
Firmware image checksums 15
FortiGuard update-server-location setting 15
External IP not allowed to be the same as mapped IP 15
Product Integration and Support 16
Language support 18
SSL VPN support 18
SSL VPN standalone client 18
SSL VPN web mode 19
SSL VPN host compatibility list 19
Resolved Issues 21
Antivirus 21
Firewall 21
FortiView 21
GUI 22
HA 22
Intrusion Prevention 23
IPsec VPN 23
Log & Report 23

FortiOS 6.0.12 Release Notes 3


Fortinet Technologies Inc.
Proxy 23
Routing 24
Security Fabric 24
SSL VPN 24
System 25
User & Device 26
VM 26
Web Filter 27
WiFi Controller 27
Common Vulnerabilities and Exposures 27
Known Issues 28
Antivirus 28
Firewall 28
GUI 28
Log & Report 28
Proxy 29
SSL VPN 29
System 29
User & Device 29
Limitations 30
Citrix XenServer limitations 30
Open source XenServer limitations 30

FortiOS 6.0.12 Release Notes 4


Fortinet Technologies Inc.
Change Log

Date Change Description

2021-01-28 Initial release.

2021-01-29 Updated Resolved Issues and Known Issues.

2021-02-01 Updated Resolved Issues and Known Issues.

2021-02-08 Added 680881 to Known Issues.

2021-02-16 Updated Built-In IPS Engine and Known Issues.

2021-02-23 Updated Built-In IPS Engine and Known Issues.

2021-03-01 Removed Built-In IPS Engine.


Updated Resolved Issues and Known Issues.

2021-03-09 Updated Known Issues.

2021-04-30 Updated Known Issues.

FortiOS 6.0.12 Release Notes 5


Fortinet Technologies Inc.
Introduction

This document provides the following information for FortiOS 6.0.12 build 0419:
l Special Notices
l Upgrade Information
l Product Integration and Support
l Resolved Issues
l Known Issues
l Limitations
For FortiOS documentation, see the Fortinet Document Library.

Supported models

FortiOS 6.0.12 supports the following models.

FortiGate FG-30D, FG-30D-POE, FG-30E, FG-30E_3G4G_INTL, FG-30E_3G4G_NAM, FG-50E,


FG-51E, FG-52E, FG-60D, FG-60D-POE, FG-60E, FG-60E-DSL, FG-60E-DSLJ,
FG-60E-POE, FG-61E, FG-70D, FG-70D-POE, FG-80D, FG-80E, FG-80E-POE, FG-81E,
FG-81E-POE, FG-90D, FG-90D-POE, FG-90E, FG-92D, FG-94D-POE, FG-98D-POE, FG-
100D, FG-100E, FG-100EF, FG-101E, FG-140D, FG-140D-POE, FG-140E, FG-140E-POE,
FG- 200D, FG-200D-POE, FG-200E, FG-201E, FG-240D, FG-240D-POE, FG-280D-POE,
FG-300D, FG-300E, FG-301E, FG-400D, FG-400E, FG-401E, FG-500D, FG-500E, FG-
501E, FG-600D, FG-600E, FG-601E, FG-800D, FG-900D, FG-1000D, FG-1200D, FG-
1500D, FG-1500DT, FG-2000E, FG-2500E, FG-3000D, FG-3100D, FG-3200D, FG-3400E,
FG-3401E, FG3600E, FG-3601E, FG-3700D, FG-3800D, FG-3810D, FG-3815D, FG-3960E,
FG-3980E, FG-5001D, FG-5001E, FG-5001E1

FortiWiFi FWF-30D, FWF-30D-POE, FWF-30E, FWF-30E_3G4G_INTL, FWF-30E_3G4G_NAM,


FWF-50E, FWF-50E-2R, FWF-51E, FWF-60D, FWF-60D-POE, FWF-60E, FWF-60E-DSL,
FWF-60E-DSLJ, FWF-61E, FWF-90D, FWF-90D-POE, FWF-92D

FortiGate Rugged FGR-30D, FGR-35D, FGR-60D, FGR-90D

FortiGate VM FG-SVM, FG-VM64, FG-VM64-ALI, FG-VM64-ALIONDEMAND, FG-VM64-AWS,


FG-VM64-AWSONDEMAND, FG-VM64-HV, FG-VM64-KVM, FG-VMX, FG-VM64-XEN,
FG-VM64-GCP, FG-VM64-OPC, FG-VM64-GCPONDEMAND

Pay-as-you-go FOS-VM64, FOS-VM64-KVM, FOS-VM64-XEN


images

FortiOS Carrier FortiOS Carrier 6.0.12 images are delivered upon request and are not available on the
customer support firmware download page.

FortiOS 6.0.12 Release Notes 6


Fortinet Technologies Inc.
Introduction

Special branch supported models

The following models are released on a special branch of FortiOS 6.0.12. To confirm that you are running the correct
build, run the CLI command get system status and check that the Branch point field shows 0419.

FG-30E-MG is released on build 5477.

FG-40F is released on build 6875.

FG-40F-3G4G is released on build 6875.

FG-60F is released on build 6878.

FG-61F is released on build 6878.

FG-100F is released on build 6878.

FG-101F is released on build 6878.

FG-1100E is released on build 6874.

FG-1101E is released on build 6874.

FG-1800F is released on build 6877.

FG-1801F is released on build 6877.

FG-2200E is released on build 6876.

FG-2201E is released on build 6876.

FG-3300E is released on build 6876.

FG-3301E is released on build 6876.

FG-VM64-AZURE is released on build 5478.

FG-VM64-AZUREONDEMAND is released on build 5478.

FG-VM64-RAXONDEMAND is released on build 9290.

FWF-40F is released on build 6875.

FWF-40F-3G4G is released on build 6875.

FWF-60F is released on build 6878.

FWF-61F is released on build 6878.

FortiOS 6.0.12 Release Notes 7


Fortinet Technologies Inc.
Special Notices

l WAN optimization and web caching functions


l FortiGuard Security Rating Service
l Using FortiManager as a FortiGuard server on page 9
l Built-in certificate
l FortiGate and FortiWiFi-92D hardware limitation
l FG-900D and FG-1000D
l FortiClient (Mac OS X) SSL VPN requirements
l FortiClient profile changes
l Use of dedicated management interfaces (mgmt1 and mgmt2)
l L2TP over IPsec on certain mobile devices on page 11

WAN optimization and web caching functions

WAN optimization and web caching functions are removed from 60D and 90D series platforms, starting from 6.0.0 due to
their limited disk size. Platforms affected are:
l FGT-60D
l FGT-60D-POE
l FWF-60D
l FWF-60D-POE
l FGT-90D
l FGT-90D-POE
l FWF-90D
l FWF-90D-POE
l FGT-94D-POE
Upon upgrading from 5.6 patches to 6.0.0, diagnose debug config-error-log read will show command parse
error about wanopt and webcache settings.

FortiGuard Security Rating Service

Not all FortiGate models can support running the FortiGuard Security Rating Service as a Fabric "root" device. The
following FortiGate platforms can run the FortiGuard Security Rating Service when added to an existing Fortinet Security
Fabric managed by a supported FortiGate model:

FGR-30D-A FGT-30D FGT-70D FWF-30E-MN


FGR-30D FGT-30D-POE FGT-70D-POE FWF-50E-2R
FGR-35D FGT-30E FGT-90D FWF-50E

FortiOS 6.0.12 Release Notes 8


Fortinet Technologies Inc.
Special Notices

FGR-60D FGT-30E-MI FGT-90D-POE FWF-51E


FGR-90D FGT-30E-MN FGT-94D-POE FWF-60D
FGT-200D FGT-50E FGT-98D-POE FWF-60D-POE
FGT-200D-POE FGT-51E FWF-30D FWF-90D
FGT-240D FGT-52E FWF-30D-POE FWF-90D-POE
FGT-240D-POE FGT-60D FWF-30E FWF-92D
FGT-280D-POE FGT-60D-POE FWF-30E-MI

Using FortiManager as a FortiGuard server

If you use FortiManager as a FortiGuard server, and you configure the FortiGate to use a secure connection to
FortiManager, you must use HTTPS with port 8888. HTTPS with port 53 is not supported.

Built-in certificate

FortiGate and FortiWiFi D-series and above have a built in Fortinet_Factory certificate that uses a 2048-bit certificate
with the 14 DH group.

FortiGate and FortiWiFi-92D hardware limitation

FortiOS 5.4.0 reported an issue with the FG-92D model in the Special Notices > FG-92D High Availability in Interface
Mode section of the release notes. Those issues, which were related to the use of port 1 through 14, include:
l PPPoE failing, HA failing to form.
l IPv6 packets being dropped.
l FortiSwitch devices failing to be discovered.
l Spanning tree loops may result depending on the network topology.
FG-92D and FWF-92D do not support STP. These issues have been improved in FortiOS 5.4.1, but with some side
effects with the introduction of a new command, which is enabled by default:
config global
set hw-switch-ether-filter <enable | disable>

When the command is enabled:

l ARP (0x0806), IPv4 (0x0800), and VLAN (0x8100) packets are allowed.
l BPDUs are dropped and therefore no STP loop results.
l PPPoE packets are dropped.
l IPv6 packets are dropped.
l FortiSwitch devices are not discovered.
l HA may fail to form depending the network topology.

FortiOS 6.0.12 Release Notes 9


Fortinet Technologies Inc.
Special Notices

When the command is disabled:

l All packet types are allowed, but depending on the network topology, an STP loop may result.

FG-900D and FG-1000D

CAPWAP traffic will not offload if the ingress and egress traffic ports are on different NP6 chips. It will only offload if both
ingress and egress ports belong to the same NP6 chip.

FortiClient (Mac OS X) SSL VPN requirements

When using SSL VPN on Mac OS X 10.8, you must enable SSLv3 in FortiOS.

FortiClient profile changes

With introduction of the Fortinet Security Fabric, FortiClient profiles will be updated on FortiGate. FortiClient profiles and
FortiGate are now primarily used for Endpoint Compliance, and FortiClient Enterprise Management Server (EMS) is now
used for FortiClient deployment and provisioning.
The FortiClient profile on FortiGate is for FortiClient features related to compliance, such as Antivirus, Web Filter,
Vulnerability Scan, and Application Firewall. You may set the Non-Compliance Action setting to Block or Warn.
FortiClient users can change their features locally to meet the FortiGate compliance criteria. You can also use FortiClient
EMS to centrally provision endpoints. The EMS also includes support for additional features, such as VPN tunnels or
other advanced options. For more information, see the FortiOS Handbook – Security Profiles.

Use of dedicated management interfaces (mgmt1 and mgmt2)

For optimum stability, use management ports (mgmt1 and mgmt2) for management traffic only. Do not use management
ports for general user traffic.

Using FortiAnalyzer units running older versions

When using FortiOS 6.0.12 with FortiAnalyzer units running 5.6.5 or lower, or 6.0.0-6.0.2, FortiAnalyzer might report
increased bandwidth and session counts if there are sessions that last longer than two minutes.
For accurate bandwidth and session counts, upgrade the FortiAnalyzer unit to the latest version.

FortiOS 6.0.12 Release Notes 10


Fortinet Technologies Inc.
Special Notices

L2TP over IPsec on certain mobile devices

Bug ID Description

459996 Samsung Galaxy Tab A 8 and Android 9.0 crash after L2TP over IPsec is connected.

FortiOS 6.0.12 Release Notes 11


Fortinet Technologies Inc.
Upgrade Information

Supported upgrade path information is available on the Fortinet Customer Service & Support site.

To view supported upgrade path information:

1. Go to https://support.fortinet.com.
2. From the Download menu, select Firmware Images.
3. Check that Select Product is FortiGate.
4. Click the Upgrade Path tab and select the following:
l Current Product

l Current FortiOS Version

l Upgrade To FortiOS Version

5. Click Go.

FortiGuard protocol and port number

Fortinet has updated the protocol that is used between the FortiGate unit and FortiGuard. Please read the section under
Resolved Issues > Common Vulnerabilities and Exposures. Upon upgrading to a patched version of FortiOS, customers
must manually change the protocol and port used for connecting to FortiGuard.
config system fortiguard
set protocol https
set port 8888
end

Once the FortiGate is upgraded to a patched version, any factory reset will change the default FortiGuard settings to
those above—protocol HTTPS and port 8888.

Fortinet Security Fabric upgrade

FortiOS 6.0.12 greatly increases the interoperability between other Fortinet products. This includes:
l FortiAnalyzer 6.0.9 and later
l FortiClient EMS 6.0.8
l FortiClient 6.0.10
l FortiAP 5.4.4 and later
l FortiSwitch 3.6.9 and later
Upgrade the firmware of each product in the correct order. This maintains network connectivity without the need to use
manual steps.

FortiOS 6.0.12 Release Notes 12


Fortinet Technologies Inc.
Upgrade Information

If Security Fabric is enabled, then all FortiGate devices must be upgraded to 6.0.12. When
Security Fabric is enabled, you cannot have some FortiGate devices running 6.0.12 and some
running 5.6.x.

Minimum version of TLS services automatically changed

For improved security, FortiOS 6.0.12 uses the ssl-min-proto-version option (under config system global)
to control the minimum SSL protocol version used in communication between FortiGate and third-party SSL and TLS
services.
When you upgrade to FortiOS 6.0.12 and later, the default ssl-min-proto-version option is TLS v1.2. The following
SSL and TLS services inherit global settings to use TLS v1.2 as the default. You can override these settings.
l Email server (config system email-server)
l Certificate (config vpn certificate setting)
l FortiSandbox (config system fortisandbox)
l FortiGuard (config log fortiguard setting)
l FortiAnalyzer (config log fortianalyzer setting)
l LDAP server (config user ldap)
l POP3 server (config user pop3)

Downgrading to previous firmware versions

Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings are
retained:
l operation mode
l interface IP/management IP
l static route table
l DNS settings
l VDOM parameters/settings
l admin user account
l session helpers
l system access profiles
If you have long VDOM names, you must shorten the long VDOM names (maximum 11 characters) before downgrading:
1. Back up your configuration.
2. In the backup configuration, replace all long VDOM names with its corresponding short VDOM name.
For example, replace edit <long_vdom_name>/<short_name> with edit <short_name>/<short_
name>.
3. Restore the configuration.
4. Perform the downgrade.

FortiOS 6.0.12 Release Notes 13


Fortinet Technologies Inc.
Upgrade Information

Amazon AWS enhanced networking compatibility issue

With this new enhancement, there is a compatibility issue with older AWS VM versions. After downgrading a 6.0.12
image to an older version, network connectivity is lost. Since AWS does not provide console access, you cannot recover
the downgraded image.
When downgrading from 6.0.12 to older versions, running the enhanced nic driver is not allowed. The following AWS
instances are affected:
l C3
l C4
l R3
l I2
l M4
l D2

FortiGate VM firmware

Fortinet provides FortiGate VM firmware images for the following virtual environments:

Citrix XenServer and Open Source XenServer

l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.OpenXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains the
QCOW2 file for Open Source XenServer.
l .out.CitrixXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.

Linux KVM

l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.kvm.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains QCOW2
that can be used by qemu.

Microsoft Hyper-V

l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.hyperv.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
three folders that can be imported by Hyper-V Manager on Hyper-V 2012. It also contains the file fortios.vhd in
the Virtual Hard Disks folder that can be manually added to the Hyper-V Manager.

VMware ESX and ESXi

l .out: Download either the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .ovf.zip: Download either the 64-bit package for a new FortiGate VM installation. This package contains Open
Virtualization Format (OVF) files for VMware and two Virtual Machine Disk Format (VMDK) files used by the OVF
file during deployment.

FortiOS 6.0.12 Release Notes 14


Fortinet Technologies Inc.
Upgrade Information

Firmware image checksums

The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support
portal, https://support.fortinet.com. After logging in select Download > Firmware Image Checksums, enter the image file
name including the extension, and select Get Checksum Code.

FortiGuard update-server-location setting

The FortiGuard update-server-location default setting is different between hardware platforms and VMs. On
hardware platforms, the default is any. On VMs, the default is usa.
On VMs, after upgrading from 5.6.3 or earlier to 5.6.4 or later (including 6.0.0 or later), update-server-location is
set to usa.
If necessary, set update-server-location to use the nearest or low-latency FDS servers.

To set FortiGuard update-server-location:

config system fortiguard


set update-server-location [usa|any]
end

External IP not allowed to be the same as mapped IP

Traffic will be dropped when the IPS is enabled in a policy with a VIP that has the same external and mapped IP.
To avoid this, the kernel will disallow the configuration of the same extip and mappedip for VIPs in the CLI starting
from FortiOS 6.0.0.

FortiOS 6.0.12 Release Notes 15


Fortinet Technologies Inc.
Product Integration and Support

The following table lists FortiOS 6.0.12 product integration and support information:

Web Browsers l Microsoft Edge 88


l Mozilla Firefox version 84
l Google Chrome version 88

Other web browsers may function correctly, but are not supported by Fortinet.

Explicit Web Proxy Browser l Microsoft Edge 41


l Microsoft Internet Explorer version 11
l Mozilla Firefox version 59

l Google Chrome version 65

l Apple Safari version 9.1 (For Mac OS X)

Other web browsers may function correctly, but are not supported by Fortinet.

FortiManager See important compatibility information in Fortinet Security Fabric upgrade on


page 12. For the latest information, see FortiManager compatibility with FortiOS in
the Fortinet Document Library.
Upgrade FortiManager before upgrading FortiGate.

FortiAnalyzer See important compatibility information in Fortinet Security Fabric upgrade on


page 12. For the latest information, see FortiAnalyzer compatibility with FortiOS in
the Fortinet Document Library.
Upgrade FortiAnalyzer before upgrading FortiGate.

FortiClient: l 6.0.0
l Microsoft Windows See important compatibility information in Fortinet Security Fabric upgrade on
l Mac OS X page 12.
l Linux

If you're upgrading both FortiOS and FortiClient from 5.6 to 6.0, upgrade
FortiClient first to avoid compatibility issues.

FortiClient for Linux is supported on Ubuntu 16.04 and later, Red Hat 7.4 and
later, and CentOS 7.4 and later.

If you are using FortiClient only for IPsec VPN or SSL VPN, FortiClient version
5.6.0 and later are supported.

FortiClient iOS l 5.6.0 and later

FortiClient Android and l 5.4.2 and later


FortiClient VPN Android

FortiAP l 5.4.2 and later


l 5.6.0 and later

FortiAP-S l 5.4.3 and later

FortiOS 6.0.12 Release Notes 16


Fortinet Technologies Inc.
Product Integration and Support

l 5.6.0 and later

FortiSwitch OS l 3.6.9 and later


(FortiLink support)

FortiController l 5.2.5 and later

Supported models: FCTL-5103B, FCTL-5903C, FCTL-5913C

FortiSandbox l 2.3.3 and later

Fortinet Single Sign-On l 5.0 build 0295 and later (needed for FSSO agent support OU in group filters)
(FSSO) l Windows Server 2019 Datacenter
l Windows Server 2019 Standard
l Windows Server 2019 Core
l Windows Server 2016 Datacenter
l Windows Server 2016 Standard
l Windows Server 2016 Core
l Windows Server 2012 Standard
l Windows Server 2012 R2 Standard
l Windows Server 2012 Core
l Windows Server 2008 (32-bit and 64-bit)
l Windows Server 2008 R2 64-bit
l Windows Server 2008 Core
l Novell eDirectory 8.8

FortiExtender l 3.3.2, 4.0.0

AV Engine l 6.00033

IPS Engine l 4.00076

Virtualization Environments

Citrix l XenServer version 5.6 Service Pack 2


l XenServer version 6.0 and later

Linux KVM l RHEL 7.1/Ubuntu 12.04 and later


l CentOS 6.4 (QEMU 0.12.1) and later

Microsoft l Hyper-V Server 2008 R2, 2012, 2012 R2, and 2016

Open Source l XenServer version 3.4.3


l XenServer version 4.1 and later

VMware l ESX versions 4.0 and 4.1


l ESXi versions 4.0, 4.1, 5.0, 5.1, 5.5, 6.0, 6.5, and 6.7

VM Series - SR-IOV The following NIC chipset cards are supported:


l Intel 82599

l Intel X540

l Intel X710/XL710

FortiOS 6.0.12 Release Notes 17


Fortinet Technologies Inc.
Product Integration and Support

Language support

The following table lists language support information.

Language support

Language GUI

English ✔

Chinese (Simplified) ✔

Chinese (Traditional) ✔

French ✔

Japanese ✔

Korean ✔

Portuguese (Brazil) ✔

Spanish ✔

SSL VPN support

SSL VPN standalone client

The following table lists SSL VPN tunnel client standalone installer for the following operating systems.

Operating system and installers

Operating System Installer

Linux CentOS 6.5 / 7 (32-bit & 64-bit) 2336. Download from the Fortinet Developer Network:
Linux Ubuntu 16.04 (32-bit & 64-bit) https://fndn.fortinet.net.

Other operating systems may function correctly, but are not supported by Fortinet.

SSL VPN standalone client no longer supports the following operating systems:
l Microsoft Windows 7 (32-bit & 64-bit)

l Microsoft Windows 8 / 8.1 (32-bit & 64-bit)

l Microsoft Windows 10 (64-bit)

l Virtual Desktop for Microsoft Windows 7 SP1 (32-bit)

FortiOS 6.0.12 Release Notes 18


Fortinet Technologies Inc.
Product Integration and Support

SSL VPN web mode

The following table lists the operating systems and web browsers supported by SSL VPN web mode.

Supported operating systems and web browsers

Operating System Web Browser

Microsoft Windows 7 SP1 (32-bit & 64-bit) Mozilla Firefox version 84


Google Chrome version 88

Microsoft Windows 10 (64-bit) Microsoft Edge


Mozilla Firefox version 84
Google Chrome version 88

Linux CentOS 6.5 / 7 (32-bit & 64-bit) Mozilla Firefox version 68

MacOS Big Sur 11.0 Apple Safari version 14


Mozilla Firefox version 84
Google Chrome version 88

iOS Apple Safari


Mozilla Firefox
Google Chrome

Android Mozilla Firefox


Google Chrome

Other operating systems and web browsers may function correctly, but are not supported by Fortinet.

SSL VPN host compatibility list

The following table lists the antivirus and firewall client software packages that are supported.

Supported Microsoft Windows XP antivirus and firewall software

Product Antivirus Firewall

Symantec Endpoint Protection 11 ✔ ✔

Kaspersky Antivirus 2009 ✔

McAfee Security Center 8.1 ✔ ✔

Trend Micro Internet Security Pro ✔ ✔

F-Secure Internet Security 2009 ✔ ✔

FortiOS 6.0.12 Release Notes 19


Fortinet Technologies Inc.
Product Integration and Support

Supported Microsoft Windows 7 32-bit antivirus and firewall software

Product Antivirus Firewall

CA Internet Security Suite Plus Software ✔ ✔

AVG Internet Security 2011

F-Secure Internet Security 2011 ✔ ✔

Kaspersky Internet Security 2011 ✔ ✔

McAfee Internet Security 2011 ✔ ✔

Norton 360™ Version 4.0 ✔ ✔

Norton™ Internet Security 2011 ✔ ✔

Panda Internet Security 2011 ✔ ✔

Sophos Security Suite ✔ ✔

Trend Micro Titanium Internet Security ✔ ✔

ZoneAlarm Security Suite ✔ ✔

Symantec Endpoint Protection Small ✔ ✔


Business Edition 12.0

FortiOS 6.0.12 Release Notes 20


Fortinet Technologies Inc.
Resolved Issues

The following issues have been fixed in version 6.0.12. For inquires about a particular bug, please contact Customer
Service & Support.

Antivirus

Bug ID Description

582368 URL threat detection version shows a large negative number after FortiGate reboots.

Firewall

Bug ID Description

520558 Should not do passive port NAT for FTP session helper.

643446 Fragmented UDP traffic is silently dropped when fragments have different ECN values.

683604 When changing a policy and creating a firewall sniffer concurrently, there is traffic that is unrelated
to the policy that is being changed and matching the implicit deny policy. Some IPv4 firewall policies
were missing after the change.

FortiView

Bug ID Description

650447 Negative value displayed in the Bytes column on the FortiView > VPN page.

FortiOS 6.0.12 Release Notes 21


Fortinet Technologies Inc.
Resolved Issues

GUI

Bug ID Description

467495 A message stating that all source interfaces have no members is erroneously displayed for the
explicit proxy policy list when a user enables a policy immediately after pasting or inserting it into the
list.

587673 The Interface Pair View option is always unavailable for the Proxy Policy list.

662434 Aggregated interfaces that are also in a zone are not displayed correctly in the GUI. They are
displayed correctly in the Zone section of Network > Interfaces, but not in the Aggregate section.

HA

Bug ID Description

507013, HA configuration checksum mismatch between debug zone and checksum.


525522

530215 Application hasync may crash several times due to accessing memory out of bound when
processing hastat data.

540600 The HA hello-holddown value is divided by 10 in the hatalk daemon, which makes the hello-
holddown time 10 times less than the configuration.

584551 hatalk keeps exchanging heartbeat packet incorrectly with FortiManager.

601550 Application hasync may crash several times due to accessing memory out of bound when
processing hastat data.

621583 HA status is not displayed in the GUI when HB cables reconnect.

637711 CSR on cluster primary is generating out-of-sync alerts on secondary and tertiary devices.

643958 Inconsistent data from FFDB caused several confsyncd crashes.

651674 Long sessions lost on new primary after HA failover.

654341 The new join-in secondary chassis failed to sync, while primary chassis has 6K policies in one
VDOM.

FortiOS 6.0.12 Release Notes 22


Fortinet Technologies Inc.
Resolved Issues

Intrusion Prevention

Bug ID Description

668631 IPS is constantly crashing, and ipshelper has high CPU when IPS extended database has too many
rules (more than 256) sharing the same pattern. Affected models: SoC3-based FortiGates.

691395 Signature false positives causing outage after IPS database update.

IPsec VPN

Bug ID Description

610203 When an offloaded IPsec SA uses NP6 reserved space, it gets stuck and packets on the tunnel start
to drop.

Log & Report

Bug ID Description

513959 Memory usage in event log does not match the number in get system performance status.

551031 FortiGate lost logs to FortiAnalyzer when route was changed and without physical interface being
down.

555161 Application miglogd crashes when numerous DLP logs are generated, where DLP archive files use
up system inodes.

634947 rlogd signal 11 crashes.

643099 logid=0000000020 is generated even with set logtraffic disable in the policy.

Proxy

Bug ID Description

501299 WAD sometimes does not spawn any workers when configuring FG-101E after a factory reset.

578850 Application WAD crash several times due to signal alarm.

603195 Multiple WAD crashes with signal 11.

615391 Reusing the buffer region caused frequent WAD crashes.

FortiOS 6.0.12 Release Notes 23


Fortinet Technologies Inc.
Resolved Issues

Bug ID Description

617099 WAD crashes every few minutes.

620453 Application WAD crash several times due to signal alarm.

621787 On some smaller models, WAD watchdog times out when there is a lot of SSL traffic.

653099 Wildcard URL filter in proxy mode with ? and * not always handled properly.

Routing

Bug ID Description

576930 Time stamps are missing in routing debugs.

593887 High CPU usage from link monitor daemon.

641022 Kernel does not remove duplicate routes generated by SD-WAN health checks when hostname IP
changes.

Security Fabric

Bug ID Description

609182 Security Fabric Settings page sometimes cannot load FortiSandbox URL threat detection version
despite FortiSandbox being connected.

SSL VPN

Bug ID Description

548599 SSL VPN crashes on parsing some special URLs.

551695 Office365 applications through SSL VPN bookmarks.

573727 Cannot establish an SSL VPN connection using FortiClient for Mac OS when os-check is enabled
and the action is allow.

573853 TX packet drops on SSL root interface.

580377 Unable to access https://outlook.office365.com as bookmark in SSL VPN web mode.

591613 https://outlook.office365.com cannot be accessed in SSLVPN web portal.

596273 sslvpnd worker process crashes, causing a zombie tunnel session.

FortiOS 6.0.12 Release Notes 24


Fortinet Technologies Inc.
Resolved Issues

Bug ID Description

608453 Internal website is not accessible from SSL VPN due to some Sage X3 JS files with errors.

610995 Error in SSL VPN web mode when accessing internal website, https://st***.st*.ca/.

617170 https://outlook.office365.com cannot be accessed in SSLVPN web portal.

622068 Adding FQDN routing address in split tunnel configuration injects single route in client for multiple A
records.

633114 Cannot access internal website pl***.fr using SSL VPN web mode.

633684 Host check causing Mac users to be unable to connect to SSL VPN.

644506 Cannot authenticate to SSL VPN using 2FA if remote LDAP user and user within RADIUS group
has same user name and password.

646429 Update Telnet idle timeout setting.

648192 Improve DTLS tunnel performance by allowing multiple packets to be read from the kernel driver,
and redistribute the UDP packets to several worker processes in the kernel.

648433 Internal website loading issue in SSL VPN web portal for ca***.fr.

656557 The map on the http://www.op***.org website could not be shown in SSL VPN web mode.

662042 The https://outlook.office365.com and https://login.microsoft.com websites cannot be accessed in


the SSL VPN web portal.

664121 SCM VPN disconnects when performing an SVN checkout.

665879 When sslvpn processes the HTTP/HTTPS response with content disposition, it will change the
response body since the content type is HTML.

670803 Internal website, http://gd***.local/share/page?pt=login, log in page does not load in SSL VPN web
mode.

System

Bug ID Description

508085 The address object is still created even if the user sets an invalid address.

540354 WAD high CPU usage on FortiGate models not supporting SSH proxy in FOS 5.6. After upgrade to
FOS 6.0, the SSL SSH profile certificate-inspection has its SSH status incorrectly set to
deep inspection.

571720 Using DHCP to acquire addresses for mode-config with certificates fails to send DHCP request.

585841 Console prints out unregister_netdevice error on UOM setup.

587521 In VIP server load-balancing, persistence http-cookie is not refreshed after the timer.

FortiOS 6.0.12 Release Notes 25


Fortinet Technologies Inc.
Resolved Issues

Bug ID Description

598464 Rebooting FG-1500D in 5.6.x during upgrade causes an L2 loop on the heartbeat interface and
VLAN is disabled on the switch side.

605723 FG-600E stops sending out packets on its SPF and copper port on NP6.

623775 newcli daemon crash due to FTM user token activation email processing.

627629 DHCP client sent invalid DHCPREQUEST format during INIT state.

628642 Issue when packets from the same session are forwarded to each LACP member when NPx
offloading is enabled.

631296 Forward or local bi-directional traffic from NPU inter-VDOM links through separate VDOMs is
subject to high latency.

633827 Errors during fuzzy tests on FG-1500D.

634929 NP6 SSE drops after a couple of hours in a stability test.

642005 FortiGate does not send service-account-id to FortiManager via fgfm tunnel when FortiCloud
is activated directly on the FortiGate.

649729 HA sync packets are hashed to a single queue while sync-packet-balance is enabled.

660709 The sflowd process has high CPU usage when application control is enabled.

666030 Empty firewall objects after pushing several policy deletes.

User & Device

Bug ID Description

604844 The user group auth-concurrent setting is not working as expected.

637577 Inconsistent fnbamd LDAP group match result.

675539 FSSO collector status is down, despite that it is reported as connected by authd in a multi-VDOM
environment.

VM

Bug ID Description

656701 FG-VMX service manager enters conserve mode; cmdbsvr has high memory utilization.

FortiOS 6.0.12 Release Notes 26


Fortinet Technologies Inc.
Resolved Issues

Web Filter

Bug ID Description

553593 diagnose debug urlfilter test-url <URL> returns URL test cache miss even
though the test URL is in the web filter rating cache.

WiFi Controller

Bug ID Description

608717 Packet loss over CAPWAP tunneled SSID.

618456 High cw_acd usage upon polling a large number of wireless clients with REST API.

680503 The current Fortinet_Wifi certificate will expire on 2021-02-11.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID CVE references

606237 FortiOS 6.0.12 is no longer vulnerable to the following CVE Reference:


l CVE-2020-6648

FortiOS 6.0.12 Release Notes 27


Fortinet Technologies Inc.
Known Issues

The following issues have been identified in version 6.0.12. For inquires about a particular bug or to report a bug, please
contact Customer Service & Support.

Antivirus

Bug ID Description

590092 Cannot clear scanunit vdom-stats to reset the statistics on ATP widget.

Firewall

Bug ID Description

508015 Editing a policy in the GUI changes the FSSO setting to disable.

591731 Cannot reorder shaping policy via GUI or CLI (FG-100F).

GUI

Bug ID Description

682440 On Firewall Policy list, the tooltip for IP Pool shows Port Block Allocation as being exhausted if there
are expiring PBAs available to be reallocated.

697290 In Firefox, the GUI cannot load the IPS signature list page if the user clicks View IPS Signatures
before the IPS profile page finishes loading. Other browsers do not have this issue.

Log & Report

Bug ID Description

592766 Log device defaults to empty and cannot be switched on in the GUI after enabling FortiAnalyzer
Cloud.

FortiOS 6.0.12 Release Notes 28


Fortinet Technologies Inc.
Known Issues

Proxy

Bug ID Description

584719 WAD reads ftp over-limit multi-line response incorrectly.

SSL VPN

Bug ID Description

673017 The traffic for a PKI user cannot pass through SSL VPN.

System

Bug ID Description

607565 Interface emac-vlan feature does not work on SoC4 platform.

657629 ARM-based platforms do not have sensor readings included in SNMP MIBs.

671982 DoS policy is causing traffic to drop.

680881 Rebooting device causes interface mode to change from static to DHCP.

695803 Unable to reorder firewall DoS policy in GUI or CLI.

User & Device

Bug ID Description

567831 Local FSSO poller is regularly missing logon events.

615513 An scep-url greater than 64 characters is not saved.

697304 The scep-url option is truncated to 64 characters, despite the maximum length being 255
characters.

FortiOS 6.0.12 Release Notes 29


Fortinet Technologies Inc.
Limitations

Citrix XenServer limitations

The following limitations apply to Citrix XenServer installations:


l XenTools installation is not supported.
l FortiGate-VM can be imported or deployed in only the following three formats:
l XVA (recommended)

l VHD

l OVF

l The XVA format comes pre-configured with default configurations for VM name, virtual CPU, memory, and virtual
NIC. Other formats will require manual configuration before the first power on process.

Open source XenServer limitations

When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may arise
when using the QCOW2 format and existing HDA issues.

FortiOS 6.0.12 Release Notes 30


Fortinet Technologies Inc.
Copyright© 2021 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., in the
U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be
trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and
other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding
commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s
General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such
event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be
limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or
development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and
guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable.

You might also like