Fortios v6.4.0 Release Notes
Fortios v6.4.0 Release Notes
Version 6.4.0
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 6
Introduction and supported models 8
Supported models 8
Special branch supported models 8
Special notices 10
CAPWAP traffic offloading 10
FortiClient (Mac OS X) SSL VPN requirements 10
Use of dedicated management interfaces (mgmt1 and mgmt2) 10
Tags option removed from GUI 11
System Advanced menu removal (combined with System Settings) 11
Application group improvements 11
NGFW mode 11
PCI passthrough ports 11
CLI and GUI behavior changes 12
FG-80E-POE and FG-81E-POE PoE controller firmware update 12
Managed switch controller in NAC policy 12
VLANs on a FortiLink interface 12
AWS-On-Demand image 13
Policy routing enhancements in the reply direction 13
Changes in CLI 14
Changes in default behavior 29
Changes in default values 30
Changes in table size 32
New features or enhancements 33
Upgrade Information 48
Device detection changes 48
FortiClient Endpoint Telemetry license 49
Fortinet Security Fabric upgrade 49
Minimum version of TLS services automatically changed 49
Downgrading to previous firmware versions 50
Amazon AWS enhanced networking compatibility issue 50
FortiLink access-profile setting 51
FortiGate VM with V-license 51
FortiGate VM firmware 51
Firmware image checksums 52
FortiGuard update-server-location setting 52
FortiView widgets 53
WanOpt configuration changes in 6.4.0 53
IPsec interface MTU value 53
Virtual WAN link member lost 54
2020-04-01 Updated Changes in default behavior, Changes in CLI, Changes in default values, Changes in
table size, New features or enhancements, Resolved issues, and Known issues.
Added Special notices > AWS-On-Demand image.
2020-04-06 Updated Changes in default behavior, Changes in CLI, New features or enhancements,
Resolved issues, and Known issues.
Added FG-91E, FG-1100E, FG-1101E, and FOS-VM64-HV to Supported models.
Removed FG-VM64-AWSONDEMAND from Supported models.
2020-04-09 Updated Changes in default behavior, Resolved issues, and Known issues.
Added Downgrading from 6.4.0 to 6.2.3 and IPsec interface MTU value to Upgrade Information.
2020-04-20 Added FG-40F, FG-60F, FG-61F, FG-100F, and FG-101F to Special branch supported models.
2020-05-04 Added FG-40F-3G4G, FWF-40F, FWF-40F-3G4G, FWF-60F, and FWF-61F to Special branch
supported models.
2020-08-27 Updated Special notices > VLANs on a FortiLink interface, Known issues, and Resolved issues.
Added 558464 to New features or enhancements.
2020-11-26 Added Policy routing enhancements in the reply direction to Special notices.
2020-11-27 Updated Changes in table size, New features or enhancements, Known issues, and Resolved
issues.
2021-02-23 Updated New features or enhancements, Known issues, and Resolved issues.
2021-07-16 Updated Policy routing enhancements in the reply direction in Special notices.
This guide provides release information for FortiOS 6.4.0 build 1579.
For FortiOS documentation, see the Fortinet Document Library.
Supported models
The following models are released on a special branch of FortiOS 6.4.0. To confirm that you are running the correct
build, run the CLI command get system status and check that the Branch point field shows 1579.
CAPWAP traffic will not offload if the ingress and egress traffic ports are on different NP6 chips. It will only offload if both
ingress and egress ports belong to the same NP6 chip. The following models are affected:
l FG-900D
l FG-1000D
l FG-2000E
l FG-2500E
When using SSL VPN on Mac OS X 10.8, you must enable SSLv3 in FortiOS.
For optimum stability, use management ports (mgmt1 and mgmt2) for management traffic only. Do not use management
ports for general user traffic.
The Tags option is removed from the GUI. This includes the following:
l The System > Tags page is removed.
l The Tags section is removed from all pages that had a Tags section.
l The Tags column is removed from all column selections.
Bug ID Description
584254 l Removed System > Advanced menu (moved most features to System > Settings page).
l Moved configuration script upload feature to top menu > Configuration > Scripts page.
l Removed GUI support for auto-script configuration (the feature is still supported in the CLI).
l Converted all compliance tests to security rating tests.
Bug ID Description
NGFW mode
Bug ID Description
584314 NGFW mode should have a link to show list of all applications.
Bug ID Description
605103 PCI passthrough ports order might be changed after upgrading. This does not affect VMXNET3 and
SR-IOV ports because SR-IOV ports are in MAC order by default.
Bug ID Description
610191 This change includes multiple behaviour changes to both the CLI and GUI:
l Added default automation rules (after factory reset). All are disabled by default, except for the
stitch/webhook/<trigger mkey>.
FortiOS 6.4.0 has resolved bug 570575 to fix a FortiGate failing to provide power to ports. Please see the Resolved
issues on page 59 section. The PoE hardware controller, however, may require an update that must be performed using
the CLI. Upon successful execution of this command, the PoE hardware controller firmware is updated to the latest
version 2.18:
diagnose poe upgrade-firmware
Bug ID Description
In FortiOS 6.4.0, VLANs on a FortiLink interface configured to use a hardware switch may fail to come up upon upgrade
or reboot due to an incorrect registration of the IP address of the switch VLAN interface.
The issue affects the FG-60E, FG-61E, FG-80E, FG-81E, FG-90E, and FG-91E models that contain a hardware switch
and have FortiLink configured on it by default. Aggregate, physical, and software switch interfaces are not affected.
A workaround (not reboot persistent) is to re-configure the IP address on each VLAN interface to a different IP address.
You may use an IP address in the same subnet and then change it back to the original IP address if desired.
AWS-On-Demand image
Bug ID Description
589605 Starting from FortiOS 6.4.0, the FGT-VM64-AWSONDEMAND image is no longer provided. Both
AWS PAYG and AWS BYOL models will share the same FGT-VM64-AWS image.
When reply traffic enters the FortiGate, and a policy route or SD-WAN rule is configured, the egress interface is chosen
as follows.
With auxiliary-session enabled in config system settings:
l Starting in 6.4.0, the reply traffic will not match any policy routes or SD-WAN rules to determine the egress interface
and next hop.
l Prior to this change, the reply traffic will match policy routes or SD-WAN rules in order to determine the egress
interface and next hop.
With auxiliary-session disabled in config system settings:
l The reply traffic will egress on the original incoming interface.
Bug ID Description
Bug ID Description
end
next
end
571819 Collect EIP from cloud-VMS (Azure, AWS, GCP, AliCloud, and OCI).
pcui-cloudinit-test # execute <?>
update-eip Update external IP. <==added
573330 Add external-web-format setting under captive-portal VAP when external portal is
selected.
config wireless-controller vap
edit guestwifi
set ssid "GuestWiFi"
set security captive-portal
set external-web "http://170.00.00.000/portal/index.php"
set selected-usergroups "Guest-group"
set intra-vap-privacy enable
set schedule "always"
set external-web-format auto-detect <==added
next
end
Bug ID Description
set name "policy_id_9"
set srcintf "wan2"
set dstintf "wan1"
set srcaddr "all"
set dstaddr "all"
set vendor-mac 36 16 <==added
set action accept
set schedule "always"
set service "ALL"
set logtraffic all
set auto-asic-offload disable
set nat enable
next
end
573411 Add UTM scan for HTTP and HTTPS over SSH tunnel (AV, WF, WAF, ICAP, DLP).
config firewall proxy-policy
edit 4
set av-profile "av" <==added
set webfilter-profile "webfilter" <==added
set dlp-sensor "dlp" <==added
set icap-profile "icap" <==added
set waf-profile "waf" <==added
next
end
Bug ID Description
574882 FAP-U431F and FAP-U433F can support 802.11ax on 2.4 GHz radio-2 when the platform mode
is single-5G.
config wireless-controller wtp-profile
edit "FAPU431F-default"
config platform
set type U431F
set mode single-5G
end
config radio-1
set band 802.11ax-5G
end
config radio-2
set band 802.11ax
end
config radio-3
set mode monitor
end
next
end
576424 Add NAT option under virtual wire pair policy and virtual wire pair policy6
with mandatory IP pool.
config firewall policy
edit 88
set srcintf "port4"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set logtraffic all
set ippool enable
set poolname "vwp-pool-1" <==required
set nat enable <==added
next
end
579703 Add hidden option never to session-ttl under firewall policy, firewall service, and
system session-ttl.
config firewall policy
edit 201
set srcintf "wan1"
set dstintf "wan2"
set srcaddr "all"
set dstaddr "all"
Bug ID Description
set action accept
set schedule "always"
set service "TCP_8080"
set logtraffic disable
set session-ttl never <==added
set nat enable
next
end
Bug ID Description
set tx-cpus [CPUs enabled to run DPDK TX engines]
end
Bug ID Description
edit "vap-cmcc"
set ssid "vap-cmcc"
set security captive-portal
set external-web
"http://172.30.144.11:8080/am/portal/ac/FG81EP4Q16000601/ssid/vap-cmcc"
set radius-server "cmcc-radius" <==added
set local-bridging enable
set portal-type cmcc
next
end
586175 Add the ability to create IPv6 geography-based address, which can be applied in firewall
policy6.
config firewall address6
edit "test-ipv6-geoip"
set type geography <==added
set country "CA"
next
end
Bug ID Description
588180 Consolidate fortitelemetry and capwap into fabric for allowaccess in system
interface.
config system interface
edit port4
set allowaccess ?
ping PING access.
https HTTPS access.
ssh SSH access.
snmp SNMP access.
http HTTP access.
telnet TELNET access.
fgfm FortiManager access.
radius-acct RADIUS accounting access.
Bug ID Description
probe-response Probe access.
fabric Security Fabric access. <==added
ftm FTM access.
next
end
Bug ID Description
next
end
next
end
593968 To populate the interface bandwidth into the interface widget, set monitor-bandwidth must be
enabled.
config system interface
edit "port1"
set vdom "root"
set ip 10.111.255.86 255.255.255.0
set allowaccess ping
set type physical
set monitor-bandwidth enable
set snmp-index 1
next
end
597703 Add new command for Azure SDN connector for FortiGate-VM deployed on Azure.
Bug ID Description
config system sdn-connector
edit "azure1"
set type azure
set use-metadata-iam [enable|disable] <==added
next
end
601345 No warning is shown in GUI when FortiGuard filtering protocol/port setting is not saved.
603137 Add tx-period under both VDOM and FortiSwitch 802.1x settings.
config switch-controller 802-1X-settings
set tx-period 30 <==added
Bug ID Description
end
603590 Support filtering on AWS Auto Scaling group for dynamic address objects.
config firewall address
edit "aws-asg-addr1"
set type dynamic
set sdn "aws-sdn"
set filter "AutoScaleGroup=10703c-4f731e90-fortigate-payg-auto-
scaling-group" <==added filter
next
end
604980 Support dynamic address objects in real servers under virtual server load balance.
config firewall vip
config realservers
set type address <==added
set address [firewall.address.dynamic_address] <==added
end
end
Bug ID Description
end
end
Add use-extreme-db option is on mid- and high-end FortiGates under antivirus setting.
config antivirus settings
set use-extreme-db [enable | disable] <==added only on mid- and high-end
FortiGates
set grayware enable
set override-timeout 0
end
607594 Add feature-set option under antivirus profile. It is used to hide non-supported features
based on value.
config antivirus profile
edit "av"
set feature-set [flow | proxy] <==added
next
end
608185 Resource record limit is now a configurable value for secondary DNS can be edited per dns-zone.
The rr-max attribute for secondary DNS was added. The maximum number of resource
records is an integer: 10–65536, or infinite is 0; the default is 16384.
config system dns-database
edit "secondary"
set domain "fm.tvssa.net"
set type slave
set rr-max 0
set ip-master 172.16.78.171
next
edit "secondary2"
set status disable
set domain "test.edu"
Bug ID Description
set type slave
set rr-max 40000
set ip-master 172.16.78.171
next
end
613860 Add object under vdom-exception that allows HA primary and secondary devices to send logs
to different syslog servers.
config sys vdom-exception
edit 1
set object log.syslogd.setting <==added
next
edit 2
set object log.syslogd.override-setting <==added
set scope inclusive
set vdom root
next
end
Bug ID Description
Bug ID Description
518983 When upgrading from previous FortiOS 6.2 versions to 6.4.0, the default WTP profiles with zero
reference are deleted.
In FortiOS 6.4.0, the default WTP profiles are not created by default until a FortiAP is added by
discovery or manually.
573065 Command exe log roll only rolls disk log, no matter what device filter is set.
587579 Implement third-party certificate verification and OCSP stapling check for all FortiGuard servers
connected from FortiOS. Make fortiguard-anycast enabled by default and through upgrading.
588583 Allow user set gateway when they use VPN IPsec static and remote IP is empty.
593122 CSF root FortiGate SDN connector and automation settings will not be synced down to CMDB in
CSF downstream FortiGate anymore.
598320 In a scenario where there are duplicate entries of config icap server with a duplicate
combination of ip-addresss, ip-version, and port, the duplicate config icap server
entries must be removed and replaced in the source data configuration (config icap profile).
This step needs to be performed before upgrading in case of configuration loss.
601413 Change set interface setting under SD-WAN member as an optional configuration.
616158 While hovering over an IP address on different GUI pages (such as Log & Report, Fabric
Connectors, and others), a tooltip informs users of additional information for the IP such as its
country, location, owner, resolved domains, etc.
Bug ID Description
548906 Change default extension information setting in wtp-profile from disable to enable.
config wireless-controller wtp-profile
edit <FAP-Profile>
set ext-info-enable enable <==changed
next
end
585889 Change default platform type setting in wtp-profile from 220B to 221E.
config wireless-controller wtp-profile
edit <New profile>
config platform
set type 221E <==changed
end
next
end
587372 Default memory log filter severity change from warning to information.
config log memory filter
set severity information <==changed
end
588382 Single 5G mode is the default setting for tri-radio AP models (FAP-U431F/U433F).
606533 Increase timeout from 10 s to 20 s when activating FortiGate Cloud from the web UI.
Bug ID Description
config switch-controller switch-log
set severity information <==changed
end
Bug ID Description
599271 Except for desktop models, all other platforms' table size of VIP real servers are increased as
follows:
l 1U platforms increased from 8 to 16
611296 Added wireless capability and scalability for the number of supported FAPs:
l FG-200E/201E WTP table size changed from 128 to 256
Bug ID Description
239809 Remove sticky clients by maintaining good SNR clients in BSS. Low SNR-based clients shall be
deauthenticated and not allowed in BSS until SNR improves for these.
config wireless-controller vap
edit weak-signal-vap
set probe-resp-suppression enable|disable
set probe-resp-threshold
set radio-sensitivity enable|disable
set radio-2g-threshold
set radio-5g-threshold
set sticky-client-remove enable|disable <==added
set sticky-client-2g-threshold <==added
set sticky-client-5g-threshold <==added
end
end
437116 For DFS-approved countries, add 160 MHz channel bonding support for FortiAP U421EV, U422EV,
and U423EV models
config wireless-controller wtp-profile
edit [ FAPU421EV-default | FAPU422EV-default | FAPU423EV-default ]
config radio-2
set band 802.11ac
set channel-bonding 160MHz
end
next
end
457153 Support SSL VPN sign on using certificate and remote (LDAP or RADIUS) username/password
authentication.
520828 Support VMWare tag filters in ESXi SDN connectors. Support obtaining and filtering of addresses
by distributed port group names when a VM is attached to a distributed virtual switch.
529340 Decouple the memory size limit from the private VM license.
529445 In wids-profile, add the new ap-scan-threshold setting, which is the minimum signal level
of rogue APs detected and required by the managed FortiAP devices. Only the rogue APs with a
signal level higher than the threshold will be reported to the FortiGate WiFi Controller.
config wireless-controller wids-profile
edit <WIDS-profile-name>
Bug ID Description
set ap-scan enable
set ap-scan-threshold "-80"
next
end
532168 Support proxy traffic after TCP three-way handshake from client to original server for a specific port.
CLI changes:
l Add proxy-after-tcp-handshake option in protocol option and SSL-SSH profile.
538760 Monitor API to check SLBC cluster checksum status. New API added - monitor/system/config-
sync/status.
Controller section
l Modem and WAN OPT pages which will still show up under Monitor if the feature is enabled.
553372 Under Administrative Access, CAPWAP and FortiTelemetry have been combined into one option
labeled Fabric Connection. If either CAPWAP or FortiTelemetry were enabled on a particular
interface, the new fabric option will be enabled after upgrading.
some basic fields: default login page and default login profile for SP, IdP certificate. This way,
the workflow to enable downstream SSO can be done from the root FortiGate. The backend
will auto-configure the SP.
l Show a warning message box in the topology tree when the FortiGate does not have SSO
configured if the root is the IdP. The Configure button is orange and matches the warning
message box.
560138 External IP list (threat feed) object support added to security policy.
l Added curl verbose diagnosis debugs to FortiClient NAC daemon for debug images.
Bug ID Description
l Added fortiems-cloud option to type attribute in user.fsso table.
l The source guard IP needs to be unique for every source guard entry across all ports.
l The binding entry is a second level table (switch_id being the base) with port_name as the
parent key. Deleted events work at a switch level, but the with second level tables, there is a
need to store grandparent context as well. An opaque data field has been created in the queue
node and the corresponding flcfg_add_event_queue and flcfg_delete_sw_event_
queue have been modified accordingly.
l Any calls to the flcfg_add_event_queue have been modified.
l There are two kinds of events that will be generated with this command: FLCFG_MSW_CMF_
569708 Support FSSO for dynamic addresses and support ClearPass endpoint connector (via
FortiManager).
CLI changes:
l Add command to show FSSO dynamic address from authd daemon:
GUI changes:
l Address dialog page
Bug ID Description
config user saml
edit *
set ?
cert Certificate to sign SAML messages.
*entity-id SP entity ID.
*single-sign-on-url SP single sign-on URL.
single-logout-url SP single logout URL.
*idp-entity-id IDP entity ID.
*idp-single-sign-on-url IDP single sign-on URL.
idp-single-logout-url IDP single logout url.
*idp-cert IDP Certificate name.
user-name User name in assertion statement.
group-name Group name in assertion statement.
next
end
l SD-WAN Interfaces list converted to a full page list with pie charts at the top.
l Added Sessions, Upload, Download (bandwidth), Bytes Sent, and Bytes Received columns to
the table.
l The Edit dialog is no longer a slide in so it is consistent with other full page lists.
SD-WAN rules:
l Added a checkmark next to interface that is currently selected by SD-WAN.
l Checkmark has Member is selected tooltip. A reason (has best measured performances/meets
most SLAs) is further stated for Best Performance (priority) and SLA (SLA/load-balance)
strategies.
l If multiple members are selected at the same time, GUI only marks the highest ranked
l In the Edit dialog, the Strategies field changed to cards to allow a brief description of each
strategy.
l Added gutter to the Edit dialog. The gutter contains Last used and Hit count of the rule.
l The gutter also contains a table showing statistics of currently selected members for SLA.
Performance SLA:
l Added support for IPv4 DNS protocol.
l Added support for using system DNS. GUI will display the system DNS server in this case.
l Support set members 0, which means all SD-WAN members participate in a health check.
Bug ID Description
573568 For FortiGate Azure HA, change public IP and routing table entries allocated in different resource
groups.
In an Azure HA scenario, EIP and route tables failover are specified in the SDN connector
configuration. A new attribute, resource-group, was added, which allows a user to specifying the
resource group that an EIP or route table is from. This new attribute can be empty so upgrade code
is not required.
If the resource-group of an EIP or route table is not provided, it is assumed the resource comes
from the same resource group setting in the SDN connector (if there is no setting, it assumes the
same resource group as the FortiGate itself by getting it from the instance metadata).
CLI changes:
l Add resource-group attribute.
Most options within config log fortianalyzer-cloud filter defaulted to disable and
could not be changed. Now, they default to enable and can be changed. License-based
restrictions still apply, but the configuration can be used to refine the logs being sent to
FortiAnalyzer Cloud.
The exception is the dlp-archive option, which is still set to disable and cannot be changed.
l Application changes related to policy merge including ips, wad, sslvpn, ocvpn, dnsproxy,
576381 Automatically disable NPU offloading if the session interface has shaping-profile enabled.
576938 Add IKE HA support for combined FGSP (L3 cluster) and FGCP (L2 cluster). This corrects the
synchronization between FGCP and FGSP clusters in order to guarantee a real ability to failover
IPsec tunnels.
Bug ID Description
l Device metadata
l Client (browser) metadata
l HTTP network logs
l JavaScript console logs
l Various daemon logs
l Client memory and CPU usage
l Device memory and CPU usage
l Single 5G
l Radio 1 operates at 2.4 GHz
l Radio 2 operates at 5 GHz
l Radio 3 set to monitor mode
l Dual 5G
l Radio 1 operates at 5 GHz and uses the higher spectrum of channels ( >=
64 )
l Radio 2: operates at 5 GHz and uses the lower spectrum of channels ( < 64)
Radio 3: can be set to AP mode
l
GUI changes:
l Added GUI support for FAP-231E platform:
l New GUI option, Dedicated scan, which is counterpart of ddscan platform property.
l When dedicated scan is enabled:
l Monitor mode becomes exclusive to radio 3
l No AP mode for radio 3, even in dual 5G
No WIDS profile setting for radio 1 and 2
l
API changes:
l /api/v2/monitor/wifi/ap_platforms
l Radio property changed from object to array to accommodate for multimode platforms.
First element is single 5G, and second is dual 5G platform radio configuration. For non-
multimode platforms, array is of length 1.
578643 The feature extends the quarantine function on the FortiSwitch by allowing a device to be
quarantined but remain with the VLAN where it was detected. The option to quarantine devices to a
VLAN remains available.
Bug ID Description
l OID: 1.3.6.1.4.1.12356.101.23.1.1
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgDhcp.fgDhcpInfo.fgDhcpServerNumber
l OID: 1.3.6.1.4.1.12356.101.23.2.1.1.2
l FORTINET-FORTIGATE-
MIB:fortinet.fnFortiGateMib.fgDhcp.fgDhcpTables.fgDhcpTable.fgDhcpEntry.
fgDhcpLeaseUsage
l Added one SNMP trap (1301) for 3 DHCP events (DHCP server runs out of IP pool, IP address
is already in use, or DHCP client interface received NAK).
l In CLI, added dhcp option to events setting in SNMP configuration.
581409 Allow administrators the ability to modify some configuration options of automatically generated
VLANs by the switch controller. These changes are applied at the time of VLAN creation.
581412 Add automated detection and recommendations to configuration and conditions observed in the
switch controller and FortiSwitch network. Administrators may accept the recommendations and
have them automatically applied.
581742 Provide an integrated FortiGate network access control (NAC) function to the FortiAP and
FortiSwitch networks by using a shared set of NAC policies. The NAC policy can be applied based
on data from the user device list.
582241 Add antiphishing feature. The initial implementation adds functionality into WAD by parsing
incoming HTTP requests, looking for known credentials, and if there is a match, performing the
configured action.
Bug ID Description
set expired-server-cert block <==added
set revoked-server-cert block <==added
set untrusted-server-cert allow
set cert-validation-timeout allow <==added
set cert-validation-failure block <==added
set sni-server-cert-check enable
end
next
end
Bug ID Description
execute router clear bgp all vrf-leak
588083 Support MAC and weight in device identification signatures to improve IoT detection. All device
identification signatures have been updated to:
l Allow the MAC address of the device to be part of the key for a signature so it can be used to
allow to signatures that would otherwise be identical to be separated by MAC address, and
allow them to identify the correct device.
l Allow every signature to have a weight (0-255) that is used as a component of the new rules,
which determines when the result of one signature should override the result of another
signature.
592214 Support UTM inspection on asymmetric traffic in FGSP where traffic returning to the session owner
is encapsulated in UDP via the peer interface.
592220 WiFi client IPv6 traffic is supported by tunnel mode and local bridge mode SSID.
Add new IPv6 suppression rule under VAP configuration.
config wireless-controller vap
edit vap-ipv6
set ipv6-rules drop-icmp6ra drop-icmp6rs drop-llmnr6 drop-icmp6mld2
drop-dhcp6s drop-dhcp6c ndp-proxy drop-ns-dad drop-ns-nondad
next
end
lists alphabetically have been removed. There is a dropdown instead with the following options:
l Group by type
l Group by zone
Bug ID Description
l Group by status,
l Group by role
lNo grouping
l Zones do not support parent-child relationships anymore.
l The DHCP Server column has been divided into two separate columns, DHCP Clients and
DHCP Ranges.
l CSF support has been added. When switching to a downstream device, both the list and the
they are in. This applies even to administrators who have access to more than one VDOM.
l On devices that support VLAN switching, the VLAN Switch Mode toggle has been removed
the muTable refresh feature from the button in the bottom-right corner.
Interfaces dialog:
l Under Administrative Access, CAPWAP and FortiTelemetry have been combined into one
Address section.
l A gutter has been added that displays the device hostname, the interface it belongs to, and
system.interface.
593216 In order to more accurately detect Internet of Things (IoT), a new FortiGuard service provides a
large database of device IoT identification. Devices detected on the local FortiGate and via FortiAP
and FortiSwitch networks can be queried with the FortiGuard IoT device database to provide
enhanced identification.
593694 This backend implementation allows the root FortiGate in a Security Fabric to store historic user and
device information in a database on its disk.
596870 Add kernel support for the IEEE 802.1ad (QinQ) feature.
In the past, 802.1Q specification allowed a single VLAN header to be inserted into an Ethernet
frame. This new feature allows one more VLAN tag to be inserted into a single frame.
597685 Starting from FortiOS 6.2.3 and 6.4.0, a single annually contracted SKU contains both VM base and
one of the FC service bundles. It is BYOL (bring-your-own-license) and supports VMware ESXi,
KVM, Hyper-V, Xen, AWS, Azure, Azure Stack, GCP, OCI, Alibaba Cloud, Rackspace, VMware
NSX-T, and Nutanix.
599925 Add option to enable/disable DFS zero wait functionality for 5 GHz radio on FAP-U platforms.
Bug ID Description
config wireless-controller wtp-profile
edit "FAPU431F-default"
config platform
set type U431F
end
set handoff-sta-thresh 30
config radio-1
set band 802.11ax-5G
set zero-wait-dfs [enable | disable] <==added, default is enable
end
config radio-2
set band 802.11ax
end
config radio-3
set mode monitor
end
next
end
600474 New feature added so local-standalone can be enabled on local bridge mode VAP with
external captive portal type.
config wireless-controller vap
edit "lo-sd-cap"
set ssid "local-stand-cap"
set security captive-portal
set external-web "https://172.18.56.163/portal/index.php"
set radius-server "peap"
set local-standalone enable <==added
set local-bridging enable
set portal-type external-auth
next
end
View More Details page. The tag displays the spectrum scan results for 2.4G and 5G bands.
CLI changes:
l Add get command to view spectrum data for an AP.
Bug ID Description
<duration(s)> <channels> <report-interval>
l This new option is under config system virtual-wan-link > config health-check
604813 Add apcfg-profile in WiFi controller to allow storing and pushing FortiAP local configuration to
FortiAP units.
config wireless-controller apcfg-profile <==added
edit [Profile Name] <==added
next
end
This feature is currently only applicable on FAP-W2/S models with the latest 6.4 firmware.
605709 New profiles added for NPI platforms, FAP-431F and FAP-433F.
config wireless-controller wtp-profile
edit "FAP433F-default"
config platform
set type 433F <==new type
set ddscan enable
end
set handoff-sta-thresh 55
config radio-1
set band 802.11ax,n,g-only
end
config radio-2
set band 802.11ax-5G
end
Bug ID Description
config radio-3
set mode monitor
end
next
edit "FAP431F-default"
config platform
set type 431F <==new type
set ddscan enable
end
set handoff-sta-thresh 55
config radio-1
set band 802.11ax,n,g-only
end
config radio-2
set band 802.11ax-5G
end
config radio-3
set mode monitor
end
next
end
608856 For FortiAPs managed by the FortiGate, a new layer-3 access control list (ACL) can be applied to
the bridge or tunnel mode SSID. This is supported on 6.4.0 FortiAP-S and FortiAP-W2, and 5.4.3
FortiAP-C platforms.
config wireless-controller access-control-list <==added
edit "ACL-1"
config layer3-ipv4-rules
edit 10
set dstaddr 172.16.200.44/255.255.255.255
set action deny
next
edit 20
set protocol 1
set action deny
next
edit 30
set dstport 21
set action deny
next
end
next
end
Bug ID Description
edit "wifi.fap.01"
set ssid "starr-ssid.fap.01"
set passphrase xxxxxxxx
set local-bridging enable
set access-control-list "ACL-1" <==added
next
end
609167 FortiGate will assign a report index for each managed FAP, so the FAP can send client, rogue AP,
and rogue station information in order. This can prevent the burst CPU usage to deal with reports
from all FAPs at the same time. This is not a visible functionality. It is a backend optimization
feature.
610146 Add provision for FortiAP unit to upgrade to designated firmware version that has been stored on
the FortiGate, while upgrading by image download after it joined.
config wireless-controller wtp
edit "FP423E3X16000020"
set admin enable
set firmware-provision "6.4.0412" <==added
set wtp-profile "FAP423E-default"
config radio-1
end
config radio-2
end
next
end
With this change, a FortiGate with a built-in disk can hold up to four versions of firmware for each
FAP model instead of one as before. A FortiGate without built-in disk can hold one version as
before.
610191 This change includes multiple behavior changes to both the CLI and GUI:
l Add default automation rules (after factory reset). They are all disabled by default except for the
stitch/webhook/<trigger mkey>.
Bug ID Description
612176 Support diffserv code setting for SD-WAN health check probe packet. When SD-WAN health check
packet is sent out, the differentiated services code point (DSCP) can be set with the set
diffservcode command:
config system virtual-wan-link
config health-check
edit h1
....
set diffservcode <6-bits binary, range 000000–111111>
next
end
next
end
615615 The purpose of the VLAN probe tool is to help customers to decide whether or not there is a WiFi
problem when they cannot reach the internet. The FortiGate and FortiAP work together to scan all
available VLANs to help customers to find the real internet issue.
l Various statistics and connectivity results have been moved from the main dialog to the gutter
617574 A new slide page is created when drilling down a WiFi station from WiFi & Switch Controller > WiFi
Clients page to view a detailed summary of the station, including signal health and logs.
Supported upgrade path information is available on the Fortinet Customer Service & Support site.
1. Go to https://support.fortinet.com.
2. From the Download menu, select Firmware Images.
3. Check that Select Product is FortiGate.
4. Click the Upgrade Path tab and select the following:
l Current Product
5. Click Go.
In FortiOS 6.0.x, the device detection feature contains multiple sub-components, which are independent:
l Visibility – Detected information is available for topology visibility and logging.
l FortiClient endpoint compliance – Information learned from FortiClient can be used to enforce compliance of those
endpoints.
l Mac-address-based device policies – Detected devices can be defined as custom devices, and then used in device-
based policies.
In 6.2, these functionalities have changed:
l Visibility – Configuration of the feature remains the same as FortiOS 6.0, including FortiClient information.
l FortiClient endpoint compliance – A new fabric connector replaces this, and aligns it with all other endpoint
connectors for dynamic policies. For more information, see Dynamic Policy - FortiClient EMS (Connector) in the
FortiOS 6.2.0 New Features Guide.
l MAC-address-based policies – A new address type is introduced (MAC address range), which can be used in
regular policies. The previous device policy feature can be achieved by manually defining MAC addresses, and then
adding them to regular policy table in 6.2. For more information, see MAC Addressed-Based Policies in the FortiOS
6.2.0 New Features Guide.
If you were using device policies in 6.0.x, you will need to migrate these policies to the regular policy table manually after
upgrade. After upgrading to 6.2.0:
1. Create MAC-based firewall addresses for each device.
2. Apply the addresses to regular IPv4 policy table.
In 6.4.0, device detection related GUI functionality has been relocated:
1. The device section has moved from User & Authentication (formerly User & Device) to a widget in Dashboard.
2. The email collection monitor page has moved from Monitor to a widget in Dashboard.
Starting with FortiOS 6.2.0, the FortiClient Endpoint Telemetry license is deprecated. The FortiClient Compliance profile
under the Security Profiles menu has been removed as has the Enforce FortiClient Compliance Check option under
each interface configuration page. Endpoints running FortiClient 6.2.0 now register only with FortiClient EMS 6.2.0 and
compliance is accomplished through the use of Compliance Verification Rules configured on FortiClient EMS 6.2.0 and
enforced through the use of firewall policies. As a result, there are two upgrade scenarios:
l Customers using only a FortiGate device in FortiOS 6.0 to enforce compliance must install FortiClient EMS 6.2.0
and purchase a FortiClient Security Fabric Agent License for their FortiClient EMS installation.
l Customers using both a FortiGate device in FortiOS 6.0 and FortiClient EMS running 6.0 for compliance
enforcement, must upgrade the FortiGate device to FortiOS 6.2.0, FortiClient to 6.2.0, and FortiClient EMS to 6.2.0.
The FortiClient 6.2.0 for MS Windows standard installer and zip package containing FortiClient.msi and language
transforms and the FortiClient 6.2.0 for macOS standard installer are included with FortiClient EMS 6.2.0.
FortiOS 6.4.0 greatly increases the interoperability between other Fortinet products. This includes:
l FortiAnalyzer 6.4.0 build 1992
l FortiClient EMS 6.4.0 build 1393
l FortiClient 6.4.0 build 1440
l FortiAP 5.6.5 and later
l FortiSwitch 3.6.11 and later
Upgrade the firmware of each product in the correct order. This maintains network connectivity without the need to use
manual steps.
If Security Fabric is enabled, then all FortiGate devices must be upgraded to 6.4.0. When
Security Fabric is enabled in FortiOS 6.4.0, all FortiGate devices must be running FortiOS
6.4.0.
For improved security, FortiOS 6.4.0 uses the ssl-min-proto-version option (under config system global) to
control the minimum SSL protocol version used in communication between FortiGate and third-party SSL and TLS
services.
When you upgrade to FortiOS 6.4.0 and later, the default ssl-min-proto-version option is TLS v1.2. The following
SSL and TLS services inherit global settings to use TLS v1.2 as the default. You can override these settings.
l Email server (config system email-server)
l Certificate (config vpn certificate setting)
l FortiSandbox (config system fortisandbox)
l FortiGuard (config log fortiguard setting)
Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings are
retained:
l operation mode
l interface IP/management IP
l static route table
l DNS settings
l admin user account
l session helpers
l system access profiles
With this enhancement, there is a compatibility issue with 5.6.2 and older AWS VM versions. After downgrading a 6.4.0
image to a 5.6.2 or older version, network connectivity is lost. Since AWS does not provide console access, you cannot
recover the downgraded image.
When downgrading from 6.4.0 to 5.6.2 or older versions, running the enhanced NIC driver is not allowed. The following
AWS instances are affected:
C5 Inf1 P3 T3a
C5d m4.16xlarge R4 u-6tb1.metal
C5n M5 R5 u-9tb1.metal
F1 M5a R5a u-12tb1.metal
G3 M5ad R5ad u-18tb1.metal
G4 M5d R5d u-24tb1.metal
H1 M5dn R5dn X1
I3 M5n R5n X1e
I3en P2 T3 z1d
A workaround is to stop the instance, change the type to a non-ENA driver NIC type, and continue with downgrading.
The new FortiLink local-access profile controls access to the physical interface of a FortiSwitch that is managed by
FortiGate.
After upgrading FortiGate to 6.4.0, the interface allowaccess configuration on all managed FortiSwitches are
overwritten by the default FortiGate local-access profile. You must manually add your protocols to the local-
access profile after upgrading to 6.4.0.
To enable split-vdom:
FortiGate VM firmware
Fortinet provides FortiGate VM firmware images for the following virtual environments:
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.OpenXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains the
QCOW2 file for Open Source XenServer.
l .out.CitrixXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.
Linux KVM
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.kvm.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains QCOW2
that can be used by qemu.
Microsoft Hyper-V Server 2019 and Windows Server 2012R2 with Hyper-V role
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.hyperv.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
three folders that can be imported by Hyper-V Manager. It also contains the file fortios.vhd in the Virtual Hard
Disks folder that can be manually added to the Hyper-V Manager.
l .out: Download either the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .ovf.zip: Download either the 64-bit package for a new FortiGate VM installation. This package contains Open
Virtualization Format (OVF) files for VMware and two Virtual Machine Disk Format (VMDK) files used by the OVF
file during deployment.
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support
portal, https://support.fortinet.com. After logging in select Download > Firmware Image Checksums, enter the image file
name including the extension, and select Get Checksum Code.
The FortiGuard update-server-location default setting is different between hardware platforms and VMs. On
hardware platforms, the default is any. On VMs, the default is usa.
On VMs, after upgrading from 5.6.3 or earlier to 5.6.4 or later (including 6.0.0 or later), update-server-location is
set to usa.
If necessary, set update-server-location to use the nearest or low-latency FDS servers.
FortiView widgets
FortiView widgets have been rewritten in 6.4.0. The FortiView page has been removed and merged in the Top
standalone dashboards in the GUI by default.
Port configuration is now done in the profile protocol options. HTTPS configurations need to have certificate inspection
configured in the firewall policy.
In FortiOS 6.4.0, set ssl-ssh-profile certificate-inspection must be added in the firewall policy:
config firewall policy
edit 1
select srcintf FGT_A:NET_CLIENT
select dstintf FGT_A:WAN
select srcaddr all
select dstaddr all
set action accept
set schedule always
select service ALL
set inspection-mode proxy
set ssl-ssh-profile certificate-inspection
set wanopt enable
set wanopt-detection off
set wanopt-profile "http"
set wanopt-peer FGT_D:HOSTID
next
end
IPsec interfaces may calculate a different MTU value after upgrading from 6.2.
This change might cause an OSPF neighbor to not be established after upgrading. The workaround is to set mtu-
ignore to enable on the OSPF interface's configuration:
config router ospf
config ospf-interface
edit "ipsce-vpnx"
set mtu-ignore enable
next
end
end
The member of virtual-wan-link is lost after upgrade if the mgmt interface is set to dedicated-to management
and part of an SD-WAN configuration before upgrade.
The following table lists FortiOS 6.4.0 product integration and support information:
Other web browsers may function correctly, but are not supported by Fortinet.
Other web browsers may function correctly, but are not supported by Fortinet.
FortiClient: l 6.4.0
l Microsoft Windows See important compatibility information in FortiClient Endpoint Telemetry license
l Mac OS X on page 49 and Fortinet Security Fabric upgrade on page 49.
l Linux
FortiClient for Linux is supported on Ubuntu 16.04 and later, Red Hat 7.4 and
later, and CentOS 7.4 and later.
If you are using FortiClient only for IPsec VPN or SSL VPN, FortiClient version 6.0
and later are supported.
Fortinet Single Sign-On l 5.0 build 0289 and later (needed for FSSO agent support OU in group filters)
(FSSO) l Windows Server 2016 Datacenter
l Windows Server 2016 Standard
l Windows Server 2016 Core
l Windows Server 2012 Standard
l Windows Server 2012 R2 Standard
l Windows Server 2012 Core
l Windows Server 2008 (32-bit and 64-bit)
l Windows Server 2008 R2 64-bit
l Windows Server 2008 Core
l Novell eDirectory 8.8
FortiExtender l 3.2.1
AV Engine l 6.00144
Virtualization Environments
Linux KVM l Ubuntu 18.0.4 LTS, 4.15.0-72-generic, QEMU emulator version 2.11.1
(Debian 1:2.11+dfsg-1ubuntu7.21)
l Intel X540
l Intel X710/XL710
Language support
Language support
Language GUI
English ✔
Chinese (Simplified) ✔
Chinese (Traditional) ✔
French ✔
Japanese ✔
Korean ✔
Portuguese (Brazil) ✔
Spanish ✔
The following table lists the operating systems and web browsers supported by SSL VPN web mode.
Mozilla Firefox
Google Chrome
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
The following issues have been fixed in version 6.4.0. For inquires about a particular bug, please contact Customer
Service & Support.
Anti Virus
Bug ID Description
557998 Quarantined CDR files cannot be downloaded. Encountered 404 error when clicking Archived File.
563250 Shared memory does not empty out properly under /tmp.
575177 Advanced threat protection statistics widget clean file count is incorrect.
590092 Cannot clear scanunit vdom-stats to reset the statistics on ATP widget.
594696 Sample file eicar.exe cannot pass through SMTPS, POP3S, or IMAPS with deep inspection and
flow enabled on IPv6 policy.
Bug ID Description
540317 DLP cannot detect attached zip files when receiving emails via MAPI over HTTP.
546964 DLP sensors and DLP options in firewall policy and profile groups are removed.
563447 Cannot download DLP archived file from GUI for HTTPS, FTPS, SMTP and SMTPS.
586689 Downloading a file with an FTP client in EPSV mode will hang.
591178 WAD fails to determine the correct file name when downloading a file from Nextcloud.
591676 Enable file filter password protected blocked for 7Z, RAR, PDF, MSOffice, and MSOfficeX.
DNS Filter
Bug ID Description
561297 DNS filtering does not perform well on the zone transfer when a large DNS zone's AXFR response
consists of one or more messages.
574980 DNS translation is not working when request is checked against the local FortiGate.
578267 DNS request to a second DNS server with same Transaction ID is discarded when DNS Filter is
enabled on a policy.
583449 DNS filter explicit block all (wildcard FQDN) not working in 6.2 firmware.
586178 In domain threat feed, some URLs cannot be fetched due to SSL error.
586526 Unable to change DNS filter profile category action after upgrading from 6.0.5 to 6.2.0.
586834 With option error-allow DNS attempts fail when FortiGuard servers are unavailable.
Endpoint Control
Bug ID Description
618757 Add dynamic firewall address to include all FortiGuard destinations required for FortiClient.
Explicit Proxy
Bug ID Description
504011 FortiGate does not generate traffic logs for SOCKS proxy.
576205 App traffic cannot be blocked in a proxy policy with certificate inspection while it works in a firewall
policy.
Bug ID Description
578098 Unwanted traffic log generated for firewall policy with web filter profile as MonitorAll.
585310 Block page is not displayed for a URL in the frames of an allowed web page.
588211 WAD cannot learn policy if multiple policies use the same FQDN address.
589065 FSSO-based NTLM sessions from explicit proxy do not respect timeout duration and type.
589811 urfilter process does not started when adding a category as dstaddr in a proxy policy with the
deny action.
590942 AV does not forward reply when GET for FTP over HTTP is used.
590959 FortiGate returns 500 internal error instead of 521 Not logged in - Secure
authentication required.
591012 WAD crashed at wad_disclaimer_get with signal 11 when disclaimer is enabled in proxy policy and
the browser is Chrome.
594580 FTP traffic over HTTP explicit proxy does not generate traffic logs once receiving error message.
594598 Enabling proxy policies (+400) increases memory by 30% and up to 80% total.
610298 Compare and sync the VSD change in V5.6 to WAD VS.
Firewall
Bug ID Description
508015 Editing a policy in the GUI changes the FSSO setting to disable.
530907 GTP-authorized SGSNs and authorized GGSNs are not functioning properly.
545121 Should not be allow to change address type that is used in an excluded group.
561170 Traffic is blocked by NGFW policy when SDN connector firewall address is configured in policy.
574012 Session created by RPC session helper does not honor delay-tcp-npu-session.
Bug ID Description
577752 Policy with a VIP with a destination interface of a zone is dropping packets.
583173 Policy push from FortiManager failed, issue caused by abandoned ISDB entr.y
585073 Adding too many address objects to a local-in policy causes all blocking to fail.
585122 Should not be allowed to rename VIP or address with the same name as an existing VIP group or
address group object.
593103 When a policy denies traffic for a VIP and send-deny-packet is enabled, ICMP unreachable
message references the mapped address, not the external.
595044 Get new CLI signal 11 crash log when performing execute internet-service refresh.
595364 Some NetFlows have an active-flow-timeout when the session does not have any packets
and the session cache in NetFlow expires and clears.
597110 When creating a firewall address with the associated-interface setting, CMD gets stuck if
there is a large nested address group.
598000 When SCTP is in closing state and there is traffic passing through to keep it from timing out, even
when an INIT is received, the traffic still passes through the old session.
598559 ISDB matches all objects and chooses the best one based on their weight values and the firewall
policy.
599253 GUI traffic shaper Bandwidth Utilization should use KBps units.
600051 Cannot establish the connection to the real servers using VIP server load-balancing after upgrading
to FortiOS 6.2.2.
600644 IPS engine did not resolve nested address groups when parsing the address group table for NGFW
security policies.
601331 Virtual load-balance VIP and intermittent HTTP health check failures.
603263 Increase the maximum limit for the optional parameters in SCTP INIT packet. After the fix, the
maximum limit is 10 instead of 4 parameters.
603927 Multiple entries do not take effect for internet-service-addition after refreshing.
604885 Cannot use the same real server for multiple HTTP host information (server load-balancing).
604886 Session stuck in proto_state=61 only when flow-based AV is enabled in the policy.
606834 Adding more than one dynamic FSSO firewall address results in GUI and CLI errors.
610557 FortiGate VIP object offers weak elliptic curves since VS implementation in WAD for FortiOS 6.0
and above.
Bug ID Description
611584 FTP and Telnet do not work with IPv6 when application control is enabled.
611840 Firewall policy search with decimal in the name fails in GUI.
615073 FTP session helper does not work when there is reflected (auxiliary) session.
FortiView
Bug ID Description
527540 On multiple FortiView sub-menus, the Quarantine Host option is no longer available.
537819 FortiView All Sessions page tooltip for geography IP shows as undefined.
582341 On Policies page, consolidated policies are without names and tooltips; tooltips not working for
security policies.
GUI
Bug ID Description
282160 GUI does not show byte information for aggregate and VLAN interfaces.
303651 Should hide Override internal DNS option if vdom-dns is set to disable.
354464 Antivirus archive logging enabled from the CLI will be disabled by editing the antivirus profile in the
GUI, even if no changes are made.
438298 When VDOM is enabled, the interface faceplate should only show data for interfaces managed by
the admin.
445074 The MMS profiles pages have been removed from the FortiOS Carrier GUI.
Workaround: You can configure MMS profiles from the CLI using the config firewall mms-
profile command.
460698 There is no uptime information in the HA Status widget for the secondary unit's GUI.
467495 A message stating that all source interfaces have no members is erroneously displayed for the
explicit proxy policy list when a user enables a policy immediately after pasting or inserting it into the
list.
478472 Options 150, 15, and 51 for the DHCP server should not be shown after removing them and having
no related configuration in the backend.
Bug ID Description
480731 Interface filter gets incorrect result (EMAC VLAN, VLAN ID, etc.) when entries are collapsed.
486230 GUI on FG-3800D with 5.6.3 is very slow for configurations with numerous policies.
493527 Compliance events GUI page does not load when redirected from the advanced compliance page.
493704 While accessing the FortiGate page, PC browser memory usage keeps spiking and finally PC
hangs.
498892 GUI shows wrong relationship between VLAN and physical interface after adding them to a zone.
499658 Editing system interface via the GUI causes the explicit web proxy to be disabled.
502962 Get Fail to retrieve info for default VDOM link on Network > Interfaces page.
504829 GUI should not log out if there is a 401 error on the downstream device.
505066 Not possible to select value for DN field in LDAP GUI browser.
510685 Hardware Switch row is shown indicating a number of interfaces but without any interfaces below.
519102 GUI navigation menu notification should match with issue in the dialog box.
525535 OK button grayed out when editing an interface that has DHCP option 224 in the list with FortiClient-
On-Net Status enabled.
526254 Interface page keeps loading when VDOM admin have netgrp permission.
529094 When creating an antispam block/allow list entry, Mark as Reject should be grayed out.
531376 Get Internal Server Error when editing an aggregate link that has a name with a space in it.
536718 Cannot change MAC address setting when configuring a reserved DHCP client.
536843 LACP aggregate interface flaps when adding/removing a member interface (first position in member
list).
537307 Failed to retrieve info message appears for ha-mgmt-interface in Network > Interfaces.
538125 Hovering mouse over FortiExtender virtual interface shows incorrect information.
540098 GUI does not display the status for VLAN and loopback in the Network > Interfaces > Status
column.
542544 In Log & Report, filtering for blank values (None) always shows no results.
543487 Collected Email Monitor page cannot list the wireless client if connected from captive-
portal+email-collection.
Bug ID Description
544442 Virtual IPs page should not show port range dialog box when the protocol is ICMP.
547409 Admin with netgrp privilege unable to get interface page and got pyfcgid crash (signal 11
(Segmentation fault)).
552038 Routing monitor network filter does not filter subnets after upgrading.
552623 Policy list page should not show inline editing icon in column field when logged in as a read-only
user.
552811 Scripts pushed from FortiCloud do not show up in System > Advanced Settings when FortiCloud
remote access is used.
553290 The tooltip for VLAN interfaces displays as Failed to retrieve info.
555121 Context menu of AP group has unsupported actions enabled after change view on Managed
FortiAPs page.
555687 Network mask of a VPN interface is changed to 255.255.255.255 without an actual configuration
change.
559866 When sending CSF proxied request, segfault happens (httpsd crashes) if FortiExplorer accesses
root FortiGate via the management tunnel.
563053 Warning message for third-party transceivers were removed for 6.2.1 to prevent excessive RMA or
support tickets. 6.2.2 re-added the warning for third-party transceivers.
564201 After OSPF change via GUI, password for virtual-link will completely disappear and must be re-
entered.
565109 Add Selected button does not appear under Application Control slide-in when VDOM is enabled.
565748 New interface pair consolidated policy added via CLI is not displayed on GUI policy page.
566414 Application Name field shows vuln_id for custom signature, not its application name in logs.
567369 Cannot save DHCP Relay configuration when the Relay IP address list is separated by a comma.
568176 GUI response is very slow when accessing Route Monitor page in GUI.
569080 SD-WAN rule GUI page doesn't show red exclamation mark for DST-negate enabled, like firewall
policy.
573070 Interface widget not loading fully (keeps spinning) when a VDOM "prof_admin" is used.
Bug ID Description
573456 FortiGate without disk email alert settings page should remove Disk usage exceeds option.
573579 Editing policies inline can result in previously selected policies being changed.
573596 GUI shifts central management type to FortiManager after clicking Apply to enable FortiManager
Cloud.
573862 Signature name should be shown when VDOM admin has WAF read/write permission only.
573869 Log search index files are never deleted when the log disk is out of space.
575756 Port Link speed option is missing on the FortiGate GUI after upgrading the managed FortiSwitch to
6.2.1.
575844 Local category for g-default, g-wifi-default web filter profiles should not be displayed.
579259 Firewall User Monitor shows "Failed to retrieve info" and no entries if session-based proxy
authentication is used.
580168 Connected routes in the routing monitor are showing up with 1969/12/31 18:59:59 for Up Since
times.
582658 Email filter page keeps loading and cannot create a new profile when the VDOM admin only has
emailfilter permission.
582716 Filtering service availability check always fails once anycast is enabled and override server is set.
583760 After adding few web rating overrides via GUI to an already existing long list of URIs, Web Rating
Overrides page does not load and keeps spinning.
584314 NGFW mode should have a link to show all applications in the list.
584426 Add Selected button does not show up under FSSO Fabric Connector with custom admin profile.
584560 GUI does not have the option to disable the interface when creating a VLAN interface.
584939 VPN event logs are incorrectly filtered when there are two Action filters and one of them contains "-".
584949 When the link status is up, the aggregate interface status icon is incorrectly displayed in red.
585055 High CPU utilization by httpsd daemon if there are too many API connections
585924 Wrong traffic shaper bandwidth unit on 32-bit platform GUI pages.
586604 No matching IPS signatures are found when Severity or Target filter is applied.
586749 Enable/disable Disarm and Reconstruction in the GUI only affects the SMTP protocol in AV profiles.
Bug ID Description
587091 When logged in as administrator with web filter read/write only privilege, the Web Rating Overrides
GUI page cannot load.
587673 The Interface Pair View option is always unavailable for the Proxy Policy list.
587686 Wrong warning message, All source interface(s) has no members, appears in Proxy Policy page.
588028 If the Endpoint Control feature is disabled, the exempt options for captive portal are not shown in the
GUI.
588222 WAN Opt. Monitor displays Total Savings as negative integers during file transfers.
588665 Option to reset statistics from Monitor > WAN Opt. Monitor in GUI does not clear the counters.
589085 Web filter profile warning message when logged in with read/write admin on VDOM environment.
592244 VIPs dialog page should be able to create VIP with the same extip/extport but different source IP
address.
593175 FortiGate with no anti-spam license is showing incorrect information under FortiGuard > Filtering
Services Availability.
593433 DHCP offset option 2 has to be removed before changing the address range for the DHCP server in
the GUI.
593624 GUI behavior is different with local user using super admin profile and TACACS user using super
admin profile.
593899 Upgrading from build 0932 to build 1010 displays Malware Hash Threat Feed is not found or
enabled error.
594162 Interface hierarchy is not respected in the GUI when a LAG interface belongs to SD-WAN and its
VLANs belong to a zone.
594565 Wrong Sub-Category appears in the Edit Web Rating Override page.
598247 One-minute memory; CPU and Sessions widgets stopped updating after system entered and exited
conserve mode.
598725 Login page shows random characters when system language is not English.
599245 Nessus vulnerability scan tool reports more medium level vulnerabilities for 6.2.3 (B1056)
compared with the 6.2.2 result.
599401 FortiGuard quota category details displays No matching entries found for local category.
599612 GUI should allow user to create redundant IPsec tunnel over different interface to the same remote
gateway.
600120 Reduce the number of core used by httpsd for low-end platforms.
601653 When deleting an AV profile in the GUI, there is no confirmation message prompt.
602637 Block intra-zone traffic toggle button function is inverted in FortiOS 6.2.3.
Bug ID Description
602692 Security Rating result for SSL VPN certificate fails when using a 384-bit elliptic curve certificate.
603583 Data source is missing in child table entries in a complex type property.
603913 GUI should add interface value check when creating a new zone.
605677 System goes into conserve mode when editing ISDB entries through GUI.
606074 Interfaces is missing in the GUI in sections for IPv4 Policy and SSL-VPN Settings after upgrading
from 6.2.2 to 6.2.3.
606394 DPD setting in GUI cannot be reflected correctly when Dialup User and On Demand are set by the
IPsec wizard.
606428 GUI does not allow multiple IPsec tunnels with the same destination IP bound to the same interface
but sourced from a different IP.
606668 Physical and logical topology pages do not load when admin has read-only permission in Security
Fabric.
607972 FortiGate enters conserve mode when accessing Amazon AWS ISDB object.
607982 Edit DNS Filter Profile page cannot be displayed if botnet domain is enabled.
610181 FG-OPC-ONDEMAND (FGVMPG license) shows FortiCare is not supported even though the
license was registered in FortiCare.
610573 When saving configuration under global interface, explicit proxy settings are removed.
611388 Firewall Policy page does not show destination when using external block address.
611436 FortiGate displays a hacked web page after selecting an IPS log.
601345 No warning is shown in GUI when FortiGuard filtering protocol/port setting is not saved.
614802 Get [__svr_d_commit:1508] Update table index error: type=4 when changing the
feature set to flow-based with FortiSandbox enabled.
639756 Monitor > SD-WAN Monitor keeps loading after disabling VPN member.
HA
Bug ID Description
530215 Application hasync might crash several times due to accessing some memory out of bound when
processing hastat data.
540632 In HA, management-ip that is set on a hardware switch interface does not respond to ping after
executing reboot.
543602 Unnecessary syncing process started during upgrade when it takes longer.
566108 Some long VDOM name configurations are changed and failed to be in sync after rebooting.
574564 In an HA configuration with HA uninterruptible upgrade enabled, some signature database files may
fail to synchronize upon upgrading from 5.6.9 and earlier to 5.6.10.
575020 HA failing config sync on VM01 with error (secondary and primary units have different hdisk
status) when primary unit is pre-configured.
576638 HA cluster GUI change does not send logs to the secondary device immediately.
578475 FortiGate HA reports not synced if firewall policy of primary and secondary device does not contain
the same VIP.
579610 Crash occurs when changing the standalone mode for A-A and A-P in config system ha.
581906 HA secondary device sending out GARP packets in 16-20 seconds after HA monitored interface
failed.
585675 exe backup disk alllogs ftp command causes FortiGate to enter conserve mode.
586004 Moving VDOM via GUI between virtual clusters causes cluster to go out of sync and VDOM state
work/standby does not change.
586835 HA secondary device unable to get checksum from primary device. HA sync in Z state.
588291 SIP HA message could overwhelm HA secondary box and drive the secondary box to conserve
mode.
Bug ID Description
590931 Multiple PPPoE connections on a single interface does not sync PPPoE dynamic assigned IP and
cannot start re-negotiation.
596837 Deleting tunnel on primary unit via API call will not delete it from the secondary unit.
596575 HA active-active primary unit attempts to steer HTTP and SMTP sessions to secondary unit over
NPU-VLINK interfaces.
598937 Local user creation causes HA to be out of sync for several minutes.
601550 Application hasync might crash several times due to accessing some memory out of bound when
processing hastat data.
602266 The configuration of the SD-WAN interface gateway IP should not sync.
602406 In a FortiGate HA cluster, performance SLA (SD-WAN) information does not sync with the
secondary unit.
613714 HA failover takes over one minute when monitored aggregate interface goes down on primary unit.
616345 Secondary device failed to sync with primary device when FGSP peer is configured, but hasync
fails to bind socket.
ICAP
Bug ID Description
598320 New constraint added in config icap server entries in FortiOS ICAP client feature.
Intrusion Prevention
Bug ID Description
561623 IPS engine 5.009 crashes when updated new FFDB has different size from the old one.
586608 The CPU consumption of ipsengine gets high with customer configuration file.
590087 When IPS pcap is enabled, traffic is intermittently disrupted after disk I/O reaches IOPS limit.
605610 Security Policy page is slow to load due to empty security firewall statistic returning from IPS
engine.
IPsec VPN
Bug ID Description
449212 New dialup IPsec tunnel in policy mode/mode-cfg overwrites previously established tunnel.
539636 Traffic will not pass through VXLAN over dynamic IPsec tunnel.
557812 IPsec does not support the new interface-subnet type in its phase2-interface and ipv4-
split-include settings for dialup VPN.
574115 PKI certificates with OU and/or DC as subject fail for PKI user filters.
575238 Redirected traffic on the same interface (ingress and egress interface are the same) is dropped.
582251 IKEv2 with EAP peer ID authentication validation does not work.
582876 ADVPN connections from the hub disconnects one-by-one and IKE gets stuck.
594962 IPsec VPN IKEv2 interoperability issue when the FortiGate uses a group as P2 selectors with a non-
FortiGate in a remote peer gateway.
595810 Unable to reach network resources via L2TP over IPsec with WAN PPPoE connection.
596429 Traffic unable to pass through for certain phase 2 selectors when there is double SA.
597246 When disabling and re-enabling OCVPN after HA failover, cannot establish IPsec tunnel.
597435 Problem establishing ADVPN shortcuts between spokes when the spoke has an additional VPN
running.
597845 IPsec VPN over IPv6 ISAKMP SA negotiation failure when setting is IPv4 DHCP mode.
599471 IKEv2 responder can delete static selectors when local narrowing occurs.
602240 IKEv2 EAP-TLS handshake detected retransmit of client, but FortiGate does not retransmit its
response.
603090 The OCVPN log file was not closed or properly trimmed due to the incorrect state_refcnt. The
OCVPN log file stayed open, grew extremely large, and was never trimmed.
Bug ID Description
604923 IKE memory leak when IKEv2 certificate subject alternative name/peer ID matching occurs.
607212 IKEv2 DPD is not triggered if network overlay network ID was mismatched when first configured.
609033 After two HA failovers, one VPN interface member of SD-WAN cannot forward packets.
610390 IKEv2 EAP certificate authentication failings after upgrading from to 6.2.1 to 6.2.3.
611148 L2TP/IPsec does not send framed IP address in RADIUS accounting updates.
617419 FortiGate does not assign correct system DNS value to the client connected to dialup VPN.
Bug ID Description
555161 Application miglogd crashes when numerous DLP logs are generated, where DLP archive files use
up system inodes.
576024 Set sniffer policy to only log logtraffic=utm but many traffic log stats are still generated in disk
or FortiAnalyzer.
578057 Action field in traffic log cannot record security policy action—it shows the consolidated policy
action.
583499 Improve local log search logic from aggressive to passive mode to save resources and CPU.
586038 FortiOS 6.0.6 reports too long VPN tunnel durations in local report.
586854 FortiGate sends change notice for global REST APIs once a minute.
590210 vwlservice traffic log has wrong internet-service name when internet-service is
enabled in the SD-WAN rule.
590598 Log viewer application control cannot show any logs (page is stuck loading).
590852 Log filter can return empty result when there are too many logs, but the filter result is small.
591152 IPS logs set srcintf(role)/dstinf(role) reversely at the time of IPS signature reverse
pattern.
591523 When refreshing logs in GUI, some log_se processes are running extremely long and consuming
CPU.
Bug ID Description
593363 Total sum of vdom log-disk-quota can be set to surpass total HD logging space.
593557 Logs to syslog server configured with FQDN addresses fail when the DNS entry gets updated for
the FQDN address.
593907 Miglogd still uses the daylight savings time after daylight savings ends.
594053 Proxy policy forward traffic log should have "timeout" action for no-reply or timeout case.
599860 When logtraffic is set to all, existing sessions cannot change the egress interfaces when the
routing table is updated with a new outgoing interface.
602459 GUI shows 401 Unauthorized error when downloading forward traffic logs with the time stamp as
the filter criterion.
606533 User observes FGT internal error while trying to log in or activate FortiGate Cloud from the
web UI.
Proxy
Bug ID Description
519861 FortiGate does not bypass the forward server if upstream proxy is down and server-down-
option is set to pass.
550056 When SNI is exempt in an SSL profile, and the SNI does not match the CN, the FortiGate closes the
session and does not perform deep inspection.
560893 When strict SNI check is enabled, FortiGate with certificate inspection cannot block session if SNI
does not match CN.
566859 In WAD conserve mode 5.6.8, max_blocks value is high on some workers.
567942 FortiGate cannot block blacklist certificate against TLS 1.3 if the blacklist certificate server address
is exempt.
Bug ID Description
572489 SSL handshake sometimes fail due to FortiGate replying back FIN to client.
573721 For FortiGate with client certificate inspect mode, traffic will trigger WAD crash.
579400 High CPU with authd process caused by WAD paring multiple line content-encoding error and IPC
broken between wad and authd.
580592 Policy in proxy-based mode with AV and WAF profile denies access to Nginx with enabled gzip
compression.
580770 SSL decryption breaks App store and Google Play store traffic even though both sites are exempted
in the decryption profile.
580943 FortiGate blocklist certificate info is not shown in replace message on certificate inspect case in TLS
1.3.
581865 In Proxy inspection with Application control and certificate inspection, TLS error for certain web
pages, in EDGE browser only.
582714 WAD might leak memory during SSL session ticket resumption.
586909 When CIFS profile is loaded, using MacOS to access Windows Share causes WAD to crash.
587987 In case of TLS 1.3 with certificate inspection and a certificate with an empty CN name, WAD
workers would locate a random size for CN name and then cause unexpected high memory usage
in WAD workers.
589065 FSSO-based NTLM sessions from explicit proxy do not respect timeout duration and type.
592153 Potential memory leak that will be triggered by certificate inspection CIC connection in WAD.
593365 WAD crash due to user learned from proxy not purged from the kernel when user is deleted from
proxy or zone with empty interface member.
Bug ID Description
594829 FTP connection is not working with AV profile in proxy inspection mode when FTP user name
contains an "@".
608387 WAD virtual server with http-multiplex enabled causes crash after server is detached because
the http_server object is detached from http_session.
610466 Multiple WAD crash on FG-500D after upgrading from 6.2.3 (wad_url_filter_user_cat_
load_entry.constprop.7).
617322 DLP FTP proxy with splice option sends delete command to server before data transfer completes.
REST API
Bug ID Description
450175 Cannot modify ge and le attributes for router prefix-list table without plugin flag.
599516 When managing FortiGate via FortiGate Cloud, sometimes user only gets read-only access.
601613 CMDB plugin should be called when saving data through CMDB REST API.
Routing
Bug ID Description
524229 SD-WAN health-check keep records useless logs under some circumstances.
570686 FortiOS 6.2.1 introduces asymmetric return path on the hub in SD-WAN after the link change due to
SLA on the spoke.
571714 DHCPv6 relay shows no route to host when there are multiple paths to reach it.
Bug ID Description
582078 ISDB ID is changed after restoring the configuration under the situation where the FortiGate has a
previous ISDB version.
584095 SD-WAN option of set gateway enable/set default enable override available on
connected routes.
584477 In transparent mode with asymmetric routing, packet in the reply direction does not use asymmetric
route.
585325 IPv6 route cannot be inactive after link-monitor is down when link-monitor are set with
ipv4 and ipv6.
587198 After failover/recovery of link, E2 route with non-zero forward address recurses to itself as a next
hope.
587700 Routing monitor policy view cannot show source and destination data for SD-WAN route and
wildcard destination.
587970 SD-WAN rules route-tag still used in service rule but not in diagnose sys virtual-wan-
link route-tag-list.
589620 Link monitor with tunnel as srcintf cannot recover after remote server down/up.
592599 FortiGate sends malformed OSPFv3 LSAReq/LSAck packets on interfaces with MTU = 9k.
593375 OSPF NSSA with multiple ASBR losing valid external OSPF routes in upstream neighbors as
different ASBRs are power cycled.
593864 Routing table is not always updated when BGP gets an update with changed next hop.
593951 Improve algorithm to distribute ECMP traffic for source IP-based/destination IP-based.
594685 Unable to create the IPsec VPN directly in Network > SD-WAN.
598665 BGP route is in routing table but not in FIB (kernel routing table).
599884 Traffic not following SD-WAN rules when one of the interfaces is VLAN.
600332 SD-WAN GUI page bandwidth shows 0 issues when there is traffic running.
600830 SD-WAN health check reports have packet loss if response time is longer than the check interval.
600995 Policy routes with large address groups containing FQDNs no longer work after upgrading to 6.2.2.
Bug ID Description
602223 SD-WAN route is not added in routing table when the SD-WAN interface members are IPv4 over
IPv6 IPsec.
602679 Prevent BGP daemon crashing when peer breaks TCP connection.
603063 Locally originated traffic on non-default VRF may follow route on VRF 0 when there are routes with
the same prefix on both VRFs.
611539 Editing/adding any address object that is referenced in policy is generating false positive SD-WAN
alert messages.
611708 Make SNMP get BGP peer state timely once BGP neighbor enters or exits established state.
Security Fabric
Bug ID Description
575495 FGCP dynamic objects are not populated in the secondary unit.
586024 Automation stitch cannot execute shutdown command when FortiGate enters kernel conserve
mode.
586587 Security Fabric widget keeps loading when FortiSwitches are in a loop, or the FortiSwitch is in
MCLAG mode.
587758 Invalid CIDR format shows as valid by the Security Fabric threat feed.
589503 Threat Feeds show the URL is invalid if there is a special character in the URL.
599474 FortiGate SDN connector not seeing all available tag name-value pairs.
604670 Time zone of scheduled automation stitches will always be taken as GMT-08:00 regardless of the
system's timezone configuration.
606003 On E model, get Failed to load Topology Report Result error after clicking Update Now button.
606714 auto-script returns failed to get SCSI info from /dev/mmcblk0 memory error.
SSL VPN
Bug ID Description
476377 SSL VPN FortiClient login with FAC user FTM two-factor fail because it times out too fast.
478957 SSL VPN web portal login history is not displayed if logs are stored in FortiAnalyzer.
491733 When SSL VPN receives multiple HTTPS post requests under web filter, read_request_data_f
loops even when client is stopped, which causes the SSL VPN process to use 99% of CPU.
525342 In some special cases, SSL VPN main state machine reads function pointer is empty that will cause
SSL VPN daemon crash.
549994 SSL VPN web mode logon page should not show Skip button for remote user with Force password
change on next logon.
556657 Internal website not working through SSL VPN web mode.
561585 SSL VPN does not correctly show Windows Admin center application.
563022 SSL VPN LDAP group object matching only matches the first policy; is not consistent with normal
firewall policy.
570171 When accessing ACT application through SSL VPN web mode, the embedded calendar request
gets wrong response and redirects to login page.
571721 Local portal ad***.ch needs more than 10 min. to load via SSL VPN bookmark.
572653 Unable to access Qlik Sense URL via SSL VPN web mode.
573787 SSL VPN web mode not displaying custom web application's JavaScript parts.
574551 Subpages on internal websites are not working via SSL VPN web mode (tunnel mode is OK).
574724 In some lower-end FortiGates, the threshold of available memory is not calculated correctly for
entering SSL VPN conserve mode. Threshold should be 10% of total memory when the memory is
larger than 512 MB and less than 2 GB.
576013 The SSL VPN web mode webserver link is not rewritten correctly after login.
Bug ID Description
577522 SSL VPN daemon crashes when logging in several times with RADIUS user that is related to a
framed IP address.
578581 SSL web mode VPN portal freezing when opening some websites using JavaScript.
580182 The EOASIS website is not displayed properly using SSL VPN web mode.
580384 SSL VPN web mode not redirecting URL as expected after successful login.
581863 Accessing http://nlyte.ote.gr/nlyte/ configured with bookmark name 'NLYTE' not getting
authentication page.
582115 Third-party (Ultimo) web app does not load over SSL VPN web portal.
582161 Internal web application is not accessible through web SSL VPN.
583339 Support HSTS include SubDomains and preload option under SSL VPN settings.
584780 When the SSL VPN portal theme is set to red, the style is lost in the SSL VPN portal.
585754 A VPN SSL bookmark failed to load the Proxmox GUI interface.
586032 Unable to download report from an internal server via SSL VPN web mode connection.
586035 The policy "script-src 'self'" will block the SSL VPN proxy URL.
587075 SAML login is not stable for SSL VPN, it requires restarting sslvpnd to enable the function.
587300 In web mode, third-party webpage stuck on loading animation; JavaScript error in console.
587732 The SSL VPN web mode SSH widget is not connecting to the SSH server.
588066 SSO for HTTPS fails when using "\" (backslash) with the domain\username format.
588119 There is no OS support for the latest macOS Catalina version (10.15) when using SSL VPN tunnel
mode.
588587 Different portals of SIPLAN COMPESA do not show properly in web mode.
590643 href rewrite has some issues with the customer's JS file.
590663 Most charts and diagrams on the website could not be shown in SSL VPN web mode when using a
special tool.
592318 After sslvpn proxy, some Kurim JS files run with an error.
Bug ID Description
593082 SSL VPN bookmark does not load Google Maps on internal server.
593367 SSL VPN bookmark does not load after clicking from the portal.
593621 Website not fully loading through web portal bookmark; loads correctly with iPad user agent.
593850 SSL VPN logs out after some users click through the remote application.
594160 Screen shot feature is not working though SSL VPN portal.
595505 FortiGate does not send client IP address as a framed IP address to RADIUS server in RADIUS
accounting request message.
595627 Cannot access some specific sites through SSL VPN web mode.
596352 SAML user name is not correctly recorded in logs when logging in to SSL VPN portal via SSO entry,
and history cannot be shown.
596412 Not possible to download PDF file after connecting to portal through SSL VPN bookmark.
596441 FortiOS does not correctly re-write the Exchange OWA logoff URL when accessed via SSL VPN
bookmark.
597282 The latest FortiOS GUI does not render when accessing it by the SSL VPN portal.
597336 Webpage does not load properly through SSL VPN web mode (fails to show CAPTCHA).
597566 Add SSL VPN SSO user logged in from SAML response.
597634 In SSL VPN web mode, internal web services not working and tunnel mode is working fine.
597658 Internal custom web application page running on Apache Tomcat is not displaying in SSL VPN web
mode.
598660 Internal website is not accessible from SSL VPN as the URL is being modified.
598850 SAML authentication group match does not work for SSL VPN; mismatched SAML user can also
log in.
599394 SSL VPN web portal bookmarks are not full loading for Vivendi SelfService application.
Bug ID Description
599658 GUI is not rendered well by SSL VPN portal when using domain and user to log in.
599668 In SSL VPN web mode, page keeps loading after user authenticates into internal application.
599671 In SSL VPN web mode, cannot display complete content on page, and cannot paste or type in the
comments section.
599777 Problem with rat***.com portal accessed via SSL VPN web mode.
599960 RADIUS user and local token push cannot log in to SSL VPN portal/tunnel when the password
needs to be changed.
600029 Sending RADIUS accounting interim update messages with SSL VPN client framed IP are delayed.
600098 Unable to access internal web URL via web mode in Safari browser.
600103 sslvpnd crashes when trying to query a DNS host name without a period (.).
601084 Site in .NET framework 4.6 or 4.7 not loading in SSL VPN web mode.
601867 SSL VPN web mode cannot open DFS share subdirectories, gives invalid HTTP request message.
602392 Cannot access remote site using SSL VPN web mode after upgrading to FOS 6.2.2.
602645 SSL VPN synology NAS web bookmark log in page does not work after upgrading to 6.2.3.
603518 Internal website not working in SSL VPN web mode; cannot load ESS/MSS page.
603524 Download progress is not shown for the FTP files of the SSL portal.
603779 Chinese characters are garbled when downloading from SMB/CIFS in SSL VPN web mode.
603817 Internal website is not shown properly in SSL VPN web mode.
603957 SSL VPN LDAP authentication does not work in multiple user group configurations after upgrading
the firewall to 6.0.7.
604882 Internal SAP website not working in SSL VPN web mode.
604910 Remedy application website is not accessible from SSL VPN as the URL is being modified.
605110 Mobile token is not required when LDAP user and LDAP group are set in SSL VPN policy together.
605699 Internal HRIS website dropdown list box not loading in SSL VPN web mode.
606094 SSL VPN web mode is not working; SSL VPN portal cannot be accessed.
607687 RDP connection via SSL VPN web portal does not work with UserPrincipalName (UPN) and NLA
security.
608195 AngularJS web application cannot load via SSL VPN web mode.
609351 SSL VPN will renew local user password, even though use is not related to SSL VPN. The remote
LDAP user password should renew.
610247 SSL VPN access top*** -- Any*** website problem with SSL VPN web bookmark.
Bug ID Description
610366 Webpage keep loading using through SSL VPN and bookmark.
610579 Videos from live cameras via SSL VPN web mode not working.
613641 SSL VPN web mode custom FortiClient download URL with %s causing sslvpnd to crash.
614528 Customer unable to load website through SSL VPN web mode.
Switch Controller
Bug ID Description
517663 On a managed FortiSwitch already running the latest GA image, Upgrade Available is shown.
527695 On a network running FortiSwitch prior to 6.0.0, a syn-error occurs. The network will still function
normally.
Workaround: Users with 6.0.x should upgrade to remove the sync-error or disable vlan-
optimization. On a network with switch-controller.global.vlan-all-mode all
configured, the setting will revert to the default value of defined. Users who wish to maintain the
vlan-all-mode all behavior may restore it after upgrading.
557280 Need to add FortiSwitch port information on Security Fabric and device inventory the same as
before 6.0.4.
581370 FortiSwitch managed by FortiGate not updating the RADIUS settings and user group in the
FortiSwitch.
592111 FortiSwitch shows offline CAPWAP response packet getting dropped/failed after upgrading from
6.2.2.
595671 set key-outbound and set key-inbound parameters are missing for GRE tunnel in config
system gre-tunnel.
601547 Unable to push user group configuration from FortiGate to FortiSwitch, and user.group
configuration is deleted.
608231 LLDP policy did not download completely to the managed FortiSwitch 108Es.
System
Bug ID Description
398024 Some error padding formats of SHA-256 SSL encrypted packets can stop the output function of
command queue in CP8.
444611 Firewall policy is deleted after a hard power cycle and subsequent file system check and reboot.
484749 TCP traffic with tcp_ecn tag cannot go through ipip ipv6 tunnel with NP6 offload enabled.
511790 Router info does not update after plugging out/plugging in USB modem.
527599 Internal prioritization of OSPF/BGP/BFD packets in conjunction with HPE feature to ensure these
routing packets are handled in time. It affects all NP6 platforms.
534806 FGR-30D cannot add ports SFP1 and SFP2 on a virtual hardware switch.
544570 Primary unit does not send SNMP trap for all SNMP servers if the cable is plugged out from the
interface configured as LAG.
547712 HPE does not protect against DDoS attacks like flood on IKE and BGP destination ports.
550206 Memory (SKB) which is no longer needed is not released in NP6 and NP6lite drivers (FG-100E, FG-
140E, FG-3600D, FG-3800D).
556408 Aggregate link does not work for LACP mode active for FG-60E internal ports but works for wan1
and wan2 combination.
570227 FortiGate is not selecting an NTP server that has a clock time in the majority clique of other NTP
servers.
570759 RX/TX counters for VLAN interfaces based on LACP interface are 0.
572003 There was a hardware defect in an earlier revision of SSD used for FG-61E. When powering off
then powering on in a very short time, the SSD may jump into ROM mode and cannot recover until a
power circle.
Bug ID Description
572763 softirq causing high CPU when session increase in an acceptable way.
573090 Making a change to a policy through inline editing is very slow with large table sizes.
573177 GUI cannot save edits made on replacement messages in a VDOM. When using CLI, user gets
logged out while editing.
573238 Session TTL expiry timer is not reset for VLAN traffic when offloading is enabled.
573973 ASIC offloading sessions sticking to interfaces after SD-WAN SLA interface selection.
574110 When adding admin down interface as a member of aggregate interface, it shows up and process
the traffic.
574327 FortiGate CSR traffic to SCEP server generated from the root VDOM instead of the VDOM createf
for the CSR.
574991 FortiGate can't extract the user principal name UPN from user certificate when certificate contains
UPN and additional names.
576337 SNMP polling stopped when FortiManager API script executed onto FortiGate.
576389 Cannot see the IP in diag ip address list if the secondary IP is deleted, set as the primary IP,
and secondary-IP is disabled.
577047 FortiGate takes a long time to reboot when it has many firewall addresses used in many policies.
577302 Virtual WAN Link process (vwl) memory usage keeps increasing after upgrading to 6.2.1.
577423 FG-80D and FG-92D kernel error in CLI during FortiGate boot up.
578269 Mismatch between number of lists with CPU usage OID and number of CPU threads.
578746 FortiGate does not accept FortiManager created country code and causes address install fails.
579168 The status of port in aggregate is not correct after changing its status.
580038 Problems with cmdbsvr while handling a large number of FSSO address groups and security
policies.
580883 DNS servers acquired via PPPoE in non-management VDOMs are used for DHCP DNS server
option 6.
Bug ID Description
581998 Session clash event log found on FG-6500F when passing a lot of the same source IP ICMP traffic
over load-balance VIP.
582498 Traffic cannot be offloaded to both NTurbo and NP6 when DOS policy is applied on ingress/egress
interface in a policy with IPS.
583199 fgfmsd crashed with signal 11 when some code accesses a VDOM that has been deleted, but
does not check the return value from CMDB query.
583602 Script to purge and re-create a local-in-policy ran against the remote FortiGate directly (in the CLI) is
causing auto-update issues.
584622 SNMP trap cannot display FortiGate model in OSPF trap information.
586042 NTPD does not requery the DNS server unless it restarts.
586301 GUI cannot show default Fortinet logo for replacement messages.
586551 When an SD-WAN member is disabled or VWL is disabled, snmpwalk shows "No Such Object
available on this agent at this OID" message.
587498 FortiGate sends ICMP type 3 code 3 (port unreachable) for UDP 500 and UDP 520 against
vulnerability scan.
587521 VIP server load-balancing persistence HTTP cookie not refreshed after the timer.
587540 NetFlow traffic records sent with wrong interface index 0 (inputint = 0 and outputint = 0)
587952 get system inter transceiver reports error for some transceivers.
588035 Kernel crashes when sniffing packets on interfaces that are related to EMAC VLAN.
589027 EMAC VLAN drops traffic when asymmetric roue enabled on internet VDOM.
589079 QSFP interface goes down when the get system interface transceiver command is
interrupted.
589234 Local system DNS setting instead of DNS setting acquired from upstream DHCP server was
assigned to client under management VDOM.
Bug ID Description
590021 Enabling auto-asic-offload results in keeping action=deny in traffic log with an accept
entry.
590295 OID for the IPsec VPN phase 2 selector only displays the first one on the list.
590423 FortiManager needs patch and minor number to update global database when FortiGate firmware
upgrade does not trigger an auto-retrieve configuration.
591078 Get zip conf file failed -1 error message when doing cfg-save.
592148 Issue with TCP packets when traversing the virtual wire pair in transparent mode.
593606 diagnose hardware test suite all fails due to FortiLink loopback test.
594499 Communication over PPPoE fails after installing PPPoE configuration from FortiManager.
594596 Crash caused by JSON filter because a null check is not done.
594865 diagnose internet-service match does not return the IP value of the IP reputation
database object.
595338 Unable to execute ping6 when configuring execute ping6-options tos, except for
default.
596421 FG-3400E/FG-3600E link is up on 25G ports only when the FEC is disabled on the Ixia tester.
600032 SNMP does not provide routing table for non-management VDOM.
601454 For 32-bit system, there is no bandwidth-unit option in traffic-shaper, but the
guaranteed-bandwidth/maximum-bandwidth help text still says Units depend on the
bandwidth-unit setting.
601866 nTurbo set IRQ affinity as failed when platform has quite a few PCIe devices and many interrupts
are requested during system bootup.
602523 DDNS monitor-interface uses the monitored interface if DDNS services other than FortiGuard
DDNS are used.
Bug ID Description
602548 Some of the clients are not getting their IP through DHCP intermittently.
602643 Interfaces get removed from SD-WAN after rebooting when interface is defined in both SD-WAN
and zone.
604550 Locally-originated DHCP relay traffic on non-default VRF may follow route on VRF 0.
604613 sentbyte of NTP on local traffic log shows as 0 bytes, even though NTP client receives the packet.
604699 Header line that is not freed might cause system to enter conserve mode in a transparent mode
deployment.
606597 When changing time zone on FG-101E, get Failed to set SMC timezone message.
607015 More than usual NTP client traffic caused by frequent DNS lookups and NTP sync for new servers,
which happens quite often on some global NTP servers.
607357 High CPU usage issue caused by high depth expectation sessions in the same hash table slot.
607452 Automatically logged out of CLI when trying to configure STP due to /bin/newcli crash.
608442 After a reboot of the PPPoE server, the FortiGate (PPPoE clients, 35 clients) keeps flapping
(connection down and up) for a long time before connecting successfully.
609783 SNMP failed to retrieve HA cluster secondary information from secondary serial number in TP
mode.
610470 A single IP existing in IP range format may cause some issues in other daemons.
610903 SMC NTP functions are enabled on some of the models that do not support the feature.
612113 xcvrd attaches shared memory multiple times causing huge memory consumption.
612302 FortiOS is not sending out IPv6 router advertisements from the link-local addresses added on the
fly.
613017 ip6-extra-addr does not perform router advertisement after reboot in HA.
613410 Host header has been added to the HTTP 1.0 request for CRL file.
Bug ID Description
616022 Long delay and cmdbsvr at 100% CPU consumption when modifying address objects and address
groups via GUI or REST API.
620479 FG-3600E interface speed setting is changed from 1000full to 10000full after upgrading from
6.2.3.
Upgrade
Bug ID Description
580450 Policies were removed after an upgrade in NGFW policy mode. Error message that Maximum
number of entries has been reached.
586123 Service group lost default members when restoring a configuration file via VDOM.
586793 Address objects have reference to old firewall policy after upgrading from 6.0.6 > 6.2.x NGFW
policies.
Bug ID Description
466651 The FortiToken Mobile push functionality on the FortiGate lacks the ability to map to a custom SSL
certificate.
546794 De-authentication of RSSO user does not clear the login from the motherboard.
557947 Non-RSSO RADIUS server shows in FSSO GUI, which should only show RSSO RADIUS servers.
573317 SSO admin with a user name over 35 characters cannot log in after the first login.
581519 Creating SCEP enrollment in context global no longer seems to work if VDOM is configured as the
management VDOM.
586334 Brief connectivity loss on shared service when RDP session is logged in to from local device.
586394 Authentication list entry is not created/updated after changing the client PC with another user in
FSSO polling mode.
587293 The session to the SQL database is closed as timeout when a new user logs in to terminal server.
587519 fnbamd takes high CPU usage and user not able to authenticate.
587666 Mobile token authentication does not work for SSL VPN on SOC3 platforms.
Bug ID Description
Affected models include: FG-60E, FG-60E-POE, FG-61E, FG-80E, FG-80E-POE, FG-81E, FG-
81E-POE, FG-100E, FG-100EF, FG-101E, FG-140E, FWF-60E, FWF-61E.
591461 FortiGate does not send user IP to TACACS server during authentication.
592241 Gmail POP3 authentication fails with certificate error since version 6.0.5.
592253 RADIUS state attribute truncated in access request when using third-party MFA (ping ID).
593116 Client PC matching multiple authentication methods (firewall, FSSO, RSSO, WSSO) may not be
matched to NGFW policies correctly.
593949 Two-factor LDAP and token authentication silently fails for users with many memberships.
596844 Admin GUI login makes the FortiGate unstable when there are lots of devices detected by device
identification.
597118 URL redirection is not supported when making up a certificate chain list.
597496 Guest user log in expires after first log in and no longer works; user is not removed from the firewall
authentication list after the set time.
602407 Deny log messages do not contain the username and group information.
605206 FortiClient server certificate in FSSO CA uses weak public key strength of 1024 bits and certificate
expiring in May 2020.
605404 FortiGate does not respond to disclaimer page request when traffic hits a disclaimer-enabled policy
with thousands of address objects.
615513, The scep-url option is truncated to 64 characters, despite the maximum length being 255
697304 characters.
VM
Bug ID Description
561909 Azure SDN connector tries querying invalid FQDN when using Azure Stack integrated systems.
571212 Only one CPU core in AWS is being used for traffic processing.
Bug ID Description
575346 gui-wanopt cache missing under system settings after upgrading a FortiGate VM with two disks.
575400 In Azure SDN, the firewall address filter cannot fetch the secondary public and private IP addresses
of the NICs.
577653 vMotion tasks cause connections to be dropped as sessions related to vMotion VMs do not appear
on the destination VMX.
577856 Add missing AWS HA failover error log and set firewall.vip/vip46/vip6/vip64 not syncing when cross
zone HA is configured.
578966 OpenStack PCI pass through sub-interface VLAN cannot receive traffic.
579708 Should replace GUI option to register to FortiCare from AWS PAYG with link to portal for
registration.
579948 New FGCP primary device is not updated in AWS route tables to reference the correct ENI.
580738 In the cluster setup, secondary unit can have different fingerprint for the OCI SDN connector, which
can cause unit to fail to connect to the OCI metatdata server properly.
580911 EIP assigned to the secondary IP address on the OCI does not fail over during HA failover.
582123 EIP does not failover if the primary FortiGate is rebooted or stopped from the Alibaba Cloud
console.
586954 FGCP cluster member reboots in infinite loop and hatalk daemon dumps the core with
segmentation fault.
587757 FG-VM image unable to be deployed on AWS with additional HDD (st1) disk type.
588436 Azure SDN connector unable to connect to Azure Kubneretes integrated with AAD.
589445 VM deployed in ESX platform with VMXNET3 does not show the correct speed and duplex settings.
590555 Allow PAYG AWS VM to bootstrap the configuration first before acquiring FortiCare license.
590780 Azure FortiGate-VM (BYOL) unable to boot up when loading a lower vCPU license than the
instance's vCPU.
592000 In Alibaba Cloud, multiple VPC route entries fail to switch when HA fails over.
593797 FG-VM64-AWS not responding to ICMP6 request when destination IPv6 address is in the neighbor
cache entry.
Bug ID Description
594248 Enabling or disabling SR-IOV under vNIC creates duplicate MAC addresses and extra interfaces on
the FortiGate.
600975 Race condition may prevent FG-VM-Azure from booting up because of deadlock when processing
NETVSC offering and vPCI offering at the same time.
601528 License validation failure log message missing when using FortiManager to validate a VM.
603365 HA secondary member instance shuts down due to RAM difference after stopping/starting the
cluster instances.
603426 AWS-PAYG in HA setup can lose its VM license after rebooting with certain setup.
605103 E1000 network adapter will be deleted if there is a VMXNET3 network adapter.
605435 API call to associate elastic IP is triggered only when the unit becomes the primary device.
606439 License validation failure log message missing when using FortiManager to validate a VM.
VoIP
Bug ID Description
580588 SDP information fields are not being NATted in multipart media encapsulation traffic.
601275 MGCP session helper does not NAT the MGCP body.
Web Filter
Bug ID Description
551956 Proxy web filtering blocks innocent sites due to urlsource="FortiSandBox Block".
560904 In NGFW mode, Security Profiles GUI is missing Web Rating Overrides page.
587120 Administrator logged in with web filter read/write privilege cannot create or edit web filter profiles in
the GUI.
593203 Cannot enter a name for a web rating override and save—error message appears when entering
the name.
606965 Unable to allow specific YouTube channel when all other YouTube channels or videos are blocked.
617225 URL is not exempted when the URL matches an exempt entry in urlfilter as well as a block
entry in the FortiGuard category.
WiFi Controller
Bug ID Description
520677 When editing a FortiAP profile on the FortiGate web UI, the previously selected SSID group(s)
cannot be displayed.
540027 FortiWiFi working as client mode cannot see and connect to the hotspot SSID from iOS devices.
555659 When FortiAP is managed with cross VDOM links, the WiFi client cannot join to SSID when auto-
asic-offload is enabled.
567933 FortiAP unable to connect to FortiGate via IPsec VPN tunnel with dtls-policy clear-text.
579908 Tunnel mode SSID packet loss seen from FAP-U24JEV and 800 connected APs.
580169 Captive portal (disclaimer) redirect not working for Android phones.
Bug ID Description
599690 Unable to perform COA with device MAC address for 802.1x wireless connection when use-
management-vdom is enabled.
601012 When upgrading from 5.6.9 to 6.0.8, channels 120, 124, and 128 are no longer there for NZ country
code.
607045 Interim accounting update message was not sent after acct-interim-interval was set from 0
if the RADIUS server was used.
615219 FortiGate cannot create WTP entry for FortiAP in transparent mode.
The following issues have been identified in version 6.4.0. For inquires about a particular bug or to report a bug, please
contact Customer Service & Support.
File Filter
Bug ID Description
626652 The unknown and bin file types catch too many random files, which leads to inconsistent results for
web traffic.
Firewall
Bug ID Description
622045 Traffic not matched by security policy when using service groups in NGFW policy mode.
622258 Move command does not work for firewall service category.
635074 Firewall policy dstaddr does not show virtual server available based on virtual WAN link member.
FortiView
Bug ID Description
615524 FortiView > All Sessions should be supported as a standalone dashboard widget in navigation bar.
643198 Threats drilldown for Sources, Destinations, and Country/Region (1 hour, 24 hours, 7 days) gives
the error, Failed to retrieve FortiView data.
GUI
Bug ID Description
528145 BGP configuration gets applied on the wrong VDOM if user switches VDOM selection in between
operations (slow GUI).
Bug ID Description
564849 HA warning message remains after primary device takes back control.
602102 Warning message is not displayed when a user configures an interface with a static IP address that
is already in use.
622510 Page is stuck and there is a blank message field when doing policy lookup with non-IP protocol.
624551 On POE devices, several sections of the GUI take over 15 seconds to fully load.
628373 Software switch members and their VLANs are not visible in the GUI interfaces list.
631734 GUI not displaying PoE total power budget on FOS 6.2.3.
634677 User group not visible in GUI when editing the user with a single right-click.
689605 On some browser versions, the GUI displays a blank dialog when creating custom application or
IPS signatures. Affected browsers: Firefox 85.0, Microsoft Edge 88.0, and Chrome 88.0.
Intrusion Prevention
Bug ID Description
622741 Traffic was blocked during the test with flow UTMs enabled.
IPsec VPN
Bug ID Description
622506 L2TP over IPsec tunnel established, but traffic cannot pass because wrong interface gets in route
lookup.
623238 ADVPN shortcut cannot be established if both spokes are behind NAT.
Proxy
Bug ID Description
619637 In transparent proxy policy with authentication on corporate firewall, it shows Access Denied after
authentication.
621787 On some smaller models, WAD watchdog times out when there is a lot of SSL traffic.
623213 Firewall does not handle 308 redirects properly for threat feed list.
Bug ID Description
624245 WAD crashes when all of these conditions are met: policy is doing deep inspection, SNI in client
hello is in the exempt list, server certificate CNAME is not in the exempt list.
636508 FortiGate blocks traffic in transparent proxy policy, even if the traffic matches the proxy address.
Routing
Bug ID Description
618100 Link health monitor with HTTP/TCP echo cannot send out probe packets in the setting interval when
the server is unreachable.
626549 SD-WAN rules created using ISDB do not match/forward via the correct interface.
Security Fabric
Bug ID Description
609182 Security Fabric Settings page sometimes cannot load FortiSandbox URL threat detection version
despite FortiSandbox being connected.
614691 Slow GUI performance in large Fabric topology with over 50 downstream devices.
623689 CSF branch FortiGate cannot successfully connect/verify certificate with remote EMS server.
SSL VPN
Bug ID Description
613111 Traffic cannot pass through FortiGate in SSL VPN web mode if the user is a PKI peer.
613612 Important GUI pages in 6.4.0 are not rendered well by SSL VPN portal.
616429 Local user assigned with FortiToken cannot log in to SSL VPN web/tunnel mode when password
change is required.
616879 Traffic cannot pass through FortiGate for SSL VPN web mode if the user is a PKI peer.
619914 Split-tunnel information is not recognized by legacy FortiClient SSL VPN Linux tool.
Bug ID Description
637018 After the upgrade to 6.0.10/6.2.4/6.4.0 SSL VPN portal mapping/remote authentication is matching
user into the incorrect group.
Switch Controller
Bug ID Description
622812 VLANs on a FortiLink interface configured to use a hardware switch interface may fail to come up
after upgrading or rebooting.
System
Bug ID Description
610900 Low throughput on FG-2201E for traffic with ECN flag enabled.
613136 Uninitialized variable that may potentially cause httpsd signal 6 and 11 crash issue.
644782 A large number of detected devices causes httpsd to consume resources, and causes low-end
devices to enter conserve mode.
Bug ID Description
VM
Bug ID Description
623376 Multi zone HA breaks after upgrading to 6.4.0 because upgrade process does not add relevant
items under VDOM exception.
Web Filter
Bug ID Description
621807 Filtering Services Availability status is down on the GUI when HTTP/80 is used for web filtering
rating service.
625897 Filtering Services Availability status is down on the GUI when HTTP/80 is used for web filtering
rating service.
654160 Web filter profile count decreased after upgrading to 6.4.0 on FG-100F.
l VHD
l OVF
l The XVA format comes pre-configured with default configurations for VM name, virtual CPU, memory, and virtual
NIC. Other formats will require manual configuration before the first power on process.
When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may arise
when using the QCOW2 format and existing HDA issues.