B&B Bezpieczeństwo w biznesie
  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

Fortinet opublikował pierwszą rewizję najnowszej rodziny oprogramowania FortiOS, oznaczonej wersją 7.2.1. Nowa wersja przynosi między innymi nowe REST API dla FortiGate oraz FortiNAC dla wymiany informacji pomiędzy oboma rozwiązaniami, dodatkowo Fortinet obdarował FortiOS nowym dynamicznym obiektem FortiNAC tag, który jest wykorzystywany do przechowywania informacji o urządzeniu, tagach z FortiNAC i informacji o grupach użytkownika otrzymanych z FortiNAC. Dodatkowo nowy FortiOS 7.2.1 posiada zewnętrzny connector dla SAP, który może być wykorzystany do synchronizowania dynamicznych obiektów adresów oraz do przyznawania dostępu do SAP Workloads. Aktualizacja przynosi również wsparcie dla zabezpieczeń w WiFi6 a konkretniej – dodano wsparcie dla Hash-to-Element (H2E)  oraz jednoczesnego uwierzytelniania równego klucza publicznego (SAE-PK) dla modeli FortiAP które wspierają WPA3-SAE.

Zmian jest znacznie więcej, dotyczą one ZTNA, komend w CLI, zachowań FortiGate w GUI, szyfrowania backupu konfiguracji, licencji testowych dla FortiGate VM – zapraszam do dalszej części artykułu!

Nowości lub ulepszenia w 7.2.1:

 

 ID Description
535099 When editing an SSID interface within WiFi & Switch Controller > SSIDs, an address group containing wireless clients’ MAC addresses and an address group policy (disable, allow, or deny) can be configured for the client MAC address filtering feature.
652281 Certain unused WAD proxy processes are not started by default on FortiGate models with 2 GB of RAM or less to reduce memory usage. These process will only start when relevant proxy features are configured.
688237 Add support for a FortiGate to manage a Procend 180-T DSL transceiver (FN-TRAN-DSL) that is plugged into an SFP port.

The management of the DSL transceiver includes the ability to program the physical layer attributes on the DSL module, retrieve the status and statistics from the module, support firmware upgrade of the module, and reset the module. The following VDSL profiles are supported: 8a, 8b, 8c, 8d, 12a, 12b, 17a, 3and 0a.

Supported platforms: FG-80F, FG-81F, FG-80F-BP, FGR-60F, and FGR-60F_3G4G.

735929 Add REST API in both FortiNAC and FortiGate that is used by FortiNAC to send user logon/logoff information to the FortiGate. A new dynamic firewall address type (FortiNAC tag) is added to FortiOS, which is used to store the device IP, FortiNAC firewall tags, and FortiNAC group information sent from FortiNAC via the REST API when user logon/logoff events are registered.

The FortiNAC tags connector under Security Fabric > Fabric Connectors is deprecated. For upgrade support, the FSSO FortiNAC user type can still be configured from the CLI.

739174 For a FortiGate with a valid Security Rating license, the separate Security Rating package downloaded from FortiGuard adds support for PSIRT vulnerabilities, which allows the security rating result to highlight them. If the security rating result highlights a vulnerability with a critical severity, then the FortiGate GUI displays a new warning message in the header and a new notification under the bell icon. Both GUI enhancements link to the System > Fabric Management page to encourage updating any affected Fortinet Fabric devices to the latest firmware releases to resolve the critical vulnerabilities.

A new View Vulnerability link in the header is visible for global administrators, and a new tooltip for the critical vulnerability label on the System > Fabric Management page both link to the Security Rating page and highlight the critical vulnerability. On the Security Rating page, the search bar supports using the PSIRT keyword to filter for PSIRT vulnerabilities, and the security panel provides a link to the System > Fabric Management page when a PSIRT vulnerability is selected.

739182 Allow FortiClients to learn the available ZTNA services from the FortiGate ZTNA portal. The services that can be learned include HTTP/HTTPS web services, TCP forwarding services, and web portals. The FortiClient must connect to the FortiGate using a DoT or DoH tunnel. Then, it can retrieve the service mapping in JSON format.
743804 Add a RADIUS option to allow the FortiGate to set the RADIUS accounting message group delimiter to a comma (,) instead of a plus sign (+) when using RSSO. The default delimiter is still a plus sign.
745135 Provide three sizes of internet service databases, and an option to choose between full, standard, or mini databases. Only FortiGate 30 and 50 series models can configure mini size.

config system global
    set internet-service-database {mini | standard | full}
end
750320 Add command to add ZTNA virtual hosts and domains to the FortiGates local DNS database. Each virtual host and domain is mapped to the VIP defined for the corresponding access proxy. Each virtual host can only be used in one access proxy.

config firewall access-proxy
    edit <name>
        set add-vhost/domain-to-dnsdb {enable | disable}
    next
end
760932 The SAP external Fabric connector allows the FortiGate to connect to an SAP controller to synchronize dynamic address objects and ports for SAP workloads. These address objects can be used in firewall policies to grant access control to dynamic SAP workloads.
764957 Add automation trigger for certificate expiry by introducing local-certificate-near-expiry event type if a user-supplied local certificate used for SSL VPN, deep inspection, or other purpose is about to expire. This trigger relies on a VPN certificate setting in the CLI configuration setting for the certificate log expiring warning threshold:

config vpn certificate setting
    set cert-expire-warning <integer>
end

Where <integer> is the certificate log expiring warning threshold, in days (0 – 100, default = 14).

The local certificate expiry trigger can be used with an email notification action, for example, to remind an administrator to re-sign or load a new local certificate to avoid any service interruptions.

765657 Add WTP profile support for FortiAP G series access points (FAP-231G, FAP-233G, FAP-431G, FAP-433G) that support Wi-Fi 6E IEEE 802.11ax Tri-band 2.4 GHz/5 GHz/6 GHz mode and dual 5 GHz mode.
766158 In a video filter profile, when the FortiGuard category-based filter and YouTube channel override are used together, by default a video will be blocked if it matches either category or YouTube channel and the action is set to block. This enhancement enables the channel action to override the category action. A category can be blocked, but certain channels in that category can be allowed when the override-category option is enabled.
773555 Add option to push updates to external threat feeds through the REST API. When configuring a FortiGuard Category, Malware Hash, IP Address, or Domain Name threat feed from the Security Fabric > External Connectors page, select the Push API update method to provide the code samples needed to perform add, remove, and snapshot operations.
775285 Enhance LAN extension on the FortiGate to allow a remote FortiGate (FortiGate Connector) to provide remote connectivity back to the FortiGate (FortiGate Controller) over a backhaul connection. A FortiGate deployed at a remote location will discover the FortiGate Controller and form an IPsec tunnel (or multiple tunnels when multiple links exists on the FortiGate Connector) back to the FortiGate Controller. A VXLAN is established over the IPsec tunnels to create an L2 network between the FortiGate Controller and the network behind the FortiGate Connector.
775287 Allow an administrator to deregister a FortiGate if the device has been registered for three or more years. After the device is deregistered, all associated contracts are also deregistered.
775288 Enhance IP address management (IPAM) in the GUI and the CLI to allow multiple pools and assign them to different interfaces based on name and/or role using IPAM rules.

In the GUI of a FortiGate not in a Security Fabric or on the root FortiGate of a Security Fabric, IPAM pools can be defined under Network > IPAM > IPAM Settings, and IPAM rules can be defined under Network > IPAM > IPAM Rules.

In the CLI of a FortiGate not in a Security Fabric or on the root FortiGate of a Security Fabric, IPAM pools can be defined as follows where a.b.c.d/x is the IP/netmask of the subnet:

config system ipam
    config pools
        edit <name>
            set subnet <a.b.c.d/x>
        next
    end
end

In the CLI of a FortiGate not in a Security Fabric or on the root FortiGate of a Security Fabric, IPAM rules can be defined as follows (device and interface fields accept * wildcard inputs):

config system ipam
    config rules
        edit <rule_name>
            set device {<FortiGate_serial_number> | *}
            set interface {<name> | *}
            set pool <pool_name>
        next
    end
end
779304 YAML can be selected as file format when backing up or restoring configurations from the GUI.
780993 When registering using FortiCare, users can select a Government end user type for parity with the registration process using the support portal.
784630 Support BGP Autonomous System (AS) numbers as input in asdot and asdot+ format from RFC 5396 for the following CLI commands:

  • BGP AS
  • BGP neighbour/neighbour group local AS
  • BGP neighbour/neighbour group remote AS
  • Route map set AS path

get router info bgp summary and other BGP router commands still display the AS numbers in asplain format.

784665 Add option for a FortiGate to use FortiManager as an override server for IoT query services.

config system central-management
    config server-list
        edit 1
            set server-type {iot-query iot-collect}
        next
    end
end
786329 Extend VCI (vendor class identifier) support in DHCP to allow for VCI pattern matching as a condition for IP or DHCP option assignment. This allows the mapping of a single IP address, IP ranges of a pool, and dedicated DHCP options to a specific VCI string.
786559 Add fgFwAuthUserTables table for SNMP to gather information about authenticated users, which are users authenticated by the user authentication methods supported on the FortiGate. This table supports SNMP VDOM access control and OIDs for IPv4 and IPv6 authenticated users.
787019 Perform FortiExtender auto firmware provisioning using CLI commands to allow a federated upgrade of a FortiExtender upon discovery and authorization by the FortiGate. The FortiExtender will be upgraded to the latest firmware from FortiGuard, based on the matching FortiExtender firmware version that matches each FortiOS firmware version.
787020 Add information and logs to record and trace connection failures to the EMS server.
787021 In an SD-WAN scenario when DSCP tags are used to mark traffic from the branch to the hub, it is sometimes desirable for the hub to mark the reply traffic with the same DCSP tags. A setting has been added to the firewall policy configurations to allow the DSCP tag to be copied to the reply direction.

config firewall policy
    edit <id>
        set diffserv-copy {enable | disable}
    next
end
787477 Ensure that session synchronization happens correctly in the FGCP over FGSP topology.

  1. When the session synchronization filter is applied on FGSP, the filter will only affect sessions synchronized between the FGSP peers.
  2. When virtual clustering is used, sessions synchronized between each virtual cluster can also be synchronized to FGSP peers. The peers’ syncvd must all be in the same HA vcluster.
789032 Embed SLA information into ICMP probes, which consists of three parts:

  1. Embed spokes’ SLA information (latency, jitter, packet loss) into the ICMP probes that the spokes send to the hub. In turn, the hub will read the embedded ICMP probes to gather SLA information on each overlay from each spoke.
  2. Allow SD-WAN to change the IKE route’s priority according to SLA status (within SLA or out of SLA) on IPsec overlays.
  3. Allow a recursively resolved BGP route to inherit the priority from its parent.

By passing SLA information to the hub, the hub can route traffic to the spoke symmetrically based on the overlay that is in SLA on the spoke.

790243 Inline scanning is supported when the FortiGate is licensed with the FortiGuard AI-Based Sandbox Service (FAIS). It works similar to inline scanning for the FortiSandbox appliance, by holding a file up to 50 seconds for the verdict to be returned. Timed out scans can either be set to block, log, or ignore. Inline scanning can be enabled from the GUI on the Cloud Sandbox configuration page.
791091 Add settings to disable a FortiGate administrator account with a customized access profile from running execute ssh and execute telnet, thus restricting jump host capability using SSH and Telnet from the FortiGate to another host.

config system accprofile
    edit <name>
        set system-execute-ssh {enable | disable}
        set system-execute-telnet {enable | disable}
    next
end
791129 Add the underlay link cost property to the IPsec VPN tunnel phase 1 configuration and enhance IPsec VPN to exchange the link cost with a remote peer as a private notified payload in the phase 1 negotiation of IKEv1 and IKEv2. This avoids possible health check daemon process load issues and improves network scalability in a large-scale SD-WAN networks with ADVPN.

config vpn ipsec phase1-interface
    edit <name>
        set link-cost <0 - 255>
    next
end
792170 The FortiGate explicit web proxy supports the Cross-Origin Resource Sharing (CORS) protocol, which allows the FortiGate to process a CORS preflight request and an actual CORS request properly, in addition to a simple CORS request when using session-based, cookie-enabled, and captive portal-enabled SAML authentication. This allows a FortiGate explicit web proxy user with this specific configuration to properly view a web page requiring CORS with domains embedded in it other than its own domain.
793303 Add a system action automation action type to back up the configuration of the FortiGate to the disk revisions, reboot the FortiGate, or shutdown the FortiGate. This action type allows these actions to occur even if the FortiGate is in conserve mode and allows the automation stitch to bypass the CLI user confirmation prompts, which the CLI script action does not support.

config system automation-action
    edit <name>
        set action-type system-actions
        set system-action {reboot | shutdown | backup-config}
    next
end
793304 Enhance the scheduled automation trigger to execute only once at a specific date and time in the future. This trigger may be useful to support one-time automated FortiGate system actions in the future, such as a configuration backup to disk, reboot, or shut down.

config system automation-trigger
    edit <name>
        set trigger-type scheduled
        set trigger-frequency once
        set trigger-datetime <YYYY-MM-DD HH:MM:SS>
    next
end
794494 Proxy auto-config (PAC) files can be downloaded for an explicit proxy through the FortiGate’s captive portal using HTTPS to ensure a secure download.
795821 Support WiFi 6 Release 2 security enhancements by adding support for Hash-to-Element (H2E) only and Simultaneous Authentication of Equals Public Key (SAE-PK) for FortiAP models that support WPA3-SAE security modes.

config wireless-controller vap
    edit <name>
        set ssid <ssid>
        set security wpa3-sae
        set sae-h2e-only {enable | disable}
    next
end
config wireless-controller vap
    edit <name>
        set ssid <ssid>
        set security wpa3-sae
        set sae-pk {enable | disable}
        set sae-private-key <private_key>
    next
end
795822 Enhance the FortiGate ZTNA access proxy to act as an inline cloud access security broker (CASB) by providing access control to software as a service (SaaS) traffic using ZTNA access control rules. This enhancement introduces a new FortiGuard Inline CASB Database (ICDB) that includes all FQDNs related to specific SaaS applications and corresponding FortiGuard packages for FortiOS and FortiClient. The inline CASB feature is included with the FortiClient ZTNA license. No separate license is needed for inline CASB.

Previously, ZTNA SaaS access control was possible using the TCP forwarding access proxy configuration on FortiGate and FortiClient:

  • On the FortiGate, users would need to search all hostnames used by a SaaS application, configure these hostnames as FQDN addresses, and configure these addresses as part of the ZTNA TCP forwarding settings.
  • In FortiClient, users would need to manually add all the hostnames as destinations for ZTNA connection rules or use FortiClient EMS to push those rules to FortiClient.

With this enhancement and service, users can configure the ZTNA access proxy with a new SaaS proxy access type and conveniently specify SaaS application destinations by application name or by application group name without needing to manually search for and enter FQDNs specific to each SaaS application. Currently, CLI commands must be used for the configuration. Users can configure the SaaS application destination by adding support for SaaS in config firewall proxy-address, which can be used in config firewall proxy-policy. The FortiGate traffic log has been enhanced with a new log field, saasname.

Support for this feature will be available in a future version of FortiClient and FortiClient EMS

796798 Support wireless controller VAP set rates-11ac-mcs-map and set rates-11ax-mcs-map commands to configure 802.11ac and 802.11ax Modulation and Coding Scheme (MCS) rates. These commands replace the set rates-11ac-ss12, set rates-11ac-ss34, set rates-11ax-ss12, and set rates-11ax-ss34 VAP commands.
796961 Add attribute under config switch-controller igmp-snooping to configure the query-interval under FortiLink, and add a check to ensure the query-interval is less than the aging-time interval.
797054 Allow FortiManager to apply a license to a BYOL FortiGate VM instance. For example, when launching a BYOL FortiGate VM on Azure, the FortiGate receives a serial number with the FGVMEV prefix and a VM license with an invalid status by default. This unlicensed FortiGate VM can register to a FortiManager for authorization and management. Subsequently, the FortiManager can apply a VM license to the FortiGate VM instance.
798310 In addition to per-tunnel IPsec failover for FGSP peers, FGCP over FGSP is also supported. For additional redundancy, an FGCP cluster on one site may form FGSP peering with FGCP clusters on other sites. The FGCP over FGSP peers can still synchronize IPsec SAs and act as the primary gateway for individual tunnels for the same dialup servers. When failover happens within an FGCP cluster, tunnel traffic will fail over to the other FGCP cluster member. When an FGCP cluster fails, tunnel traffic will fail over to the other FGSP peer.
798773 Add options in IPv6 static and policy routes for parity with IPv4 static and policy routes.
799621 Support wireless authentication using SAML and a captive portal configured on a tunnel mode SSID.

When a SAML user has been configured on the FortiGate, a user group containing this SAML user can be applied to a captive portal in a wireless tunnel mode SSID. When configured with both a captive portal exempt firewall policy to allow wireless clients to contact the SAML IdP and a firewall policy with the SAML user group applied to allow authenticated traffic, upon connecting to this SSID, wireless clients will be redirected to a login page for wireless authentication using SAML.

799971 To synchronize Active Directory users and apply two-factor authentication using FortiToken Cloud, two-factor authentication can be enabled under the user ldap object definition. This enhancement reduces the number of the AD users returned by allowing the use of a group filter to synchronize only the users who meet the group filter criteria.

config user ldap
    edit <name>
        set dn <string> 
        set two-factor {disable | fortitoken-cloud}
        set two-factor-filter <string> 
    next
end
799987 Add support for multitenant FortiClient EMS deployments that have the Manage Multiple Customer Sites setting enabled with multiple sites. Since a FortiClient EMS site is no longer unique using its serial number alone, the FortiGate configuration for FortiClient EMS connectors and related diagnostic commands have been enhanced to distinguish EMS sites using serial number and tenant ID:

  • Update config endpoint-control fctems to predefine five FortiClient EMS Fabric connectors that are referred to using numerical IDs from 1 to 5. Administrators can configure the status and name settings, and to display the tenant ID retrieved from FortiClient EMS sites with Manage Multiple Customer Sites enabled.A single tenant EMS server or the default site on a multitenant EMS server has a tenant ID consisting of all zeros (00000000000000000000000000000000).
  • Update the FortiClient EMS Fabric connector to retrieve specific ZTNA tags from each configured FortiClient EMS site.
  • Update diagnose endpoint record list to return the EMS tenant id field retrieved from each respective FortiClient EMS server.
  • Update ZTNA and EMS debug commands to accept the EMS serial number and tenant ID as parameters.
    # diagnose endpoint lls-comm send ztna find-uid <uid> <EMS_serial_number> <EMS_tenant_id>
    # diagnose wad dev query-by uid <uid> <EMS_serial_number> <EMS_tenant_id>
801700 Add option to enable automatic firmware updates based on the FortiGuard upgrade path. When enabled, the FortiGate will look for an upgrade path and perform an upgrade at a time within the time period specified by the administrator. The upgrade will only be performed on a patch within the same major release version.

config system fortiguard
    set auto-firmware-upgrade {enable | disable}
    set auto-firmware-upgrade-day {sunday monday tuesday wednesday thursday friday saturday}
    set auto-firmware-upgrade-start-hour <integer>
    set auto-firmware-upgrade-end-hour <integer>
end
801701 Certain unused WAD proxy processes are not started by default on FortiGate models with 2 GB of RAM or less to reduce memory usage. These process will only start when relevant proxy features are configured.
801707 During FGSP per-tunnel failover for IPsec, the same IPsec dialup server configured on each FGSP member may establish tunnels with dialup clients as the primary gateway. The IPsec SAs are synchronized to all other FGSP peers that have FGSP synchronization for IPsec enabled. Other FGSP members may establish a tunnel with other clients on the same dialup server and synchronize their SAs to other peers.

Upon the failure of the FGSP member that is the primary gateway for a tunnel, the upstream router will fail over the tunnel traffic to another FGSP member. The other FGSP member will move from standby to the primary gateway for that tunnel and continue to forward traffic.

config vpn ipsec phase1-interface
    edit <name>
        set fgsp-sync {enable | disable}
    next
end
801708 In conjunction with support for FGSP per-tunnel failover for IPsec, configuring DPD (dead peer detection) on an FGSP member is now permitted. This allows a failed FGSP member to send out DPD probes during failover to detect the unreachable remote peer and flush the corresponding tunnels.
802702 When local-out traffic such as SD-WAN health checks, SNMP, syslog, and so on are initiated from an interface on one VRF and then pass through interfaces on another VRF, the reply traffic will be successfully forwarded back to the original VRF.
802785 Add the ability to toggle 802.11d support for 2.4 GHz radios using a FortiAP profile. 802.11d only applies to the 802.11g band (2.4 GHz band). By default, this option is always enabled. When 802.11d is enabled, the FortiAPs broadcast the country code in beacons, probe requests, and probe responses. The ability to disable 802.11d on the FortiAPs provides backwards compatibility with old or legacy Wi-Fi clients in the 802.11g band (2.4 GHz band) that failed to associate to a FortiAP with 802.11d enabled.
803326 Vendor-Specific Attributes (VSAs) can be used with TACACS authentication and authorization in wildcard system administrator access to FortiGates from browsers and SSH. The new VSAs allows the FortiGate to perform group matching, and overwrite VDOM settings under system admin.
805870 Add setting to enforce ZTNA trusted client before the user can successfully establish a SSL VPN tunnel when connecting to FortiGate SSL VPN in tunnel mode, and has a device certificated issued by EMS.

config vpn ssl setting
    set ztna-trusted-client {enable | disable}
end
805871 Add support in Azure FG-VM to generate a unique vWAN cluster/group ID and display a line with the Azure NVA name and the generated cluster/group ID in get system status. This line is only displayed for FortiGate instances that are NVA VMs. FortiManager uses the cluster/group ID to display FortiGate VM instances from the same vWAN as a group.
806166 Add NetFlow support on EMAC VLAN interface.
806628 Added endpoint to return HA non-synchronized checksum. The HA checksum calculation module has new parameter to switch between the regular checksum calculation and the non-synchronized checksum calculation.

# diagnose sys ha checksum show-nonsync [global | vdom_name]
806993 Enhance the ZTNA access proxy to determine whether a client device that does not have FortiClient installed is a mobile device that is considered unmanageable, or is not a mobile device that is considered unknown and tag the device as either either ems-tag-unmanageable or ems-tag-unknown respectively. The FortiGate WAD process achieves this by either matching device TLS fingerprints against a library or learning information from the HTTP User-Agent header if the set user-agent-detect setting is enabled. These new tags allow for ZTNA access control of unmanaged devices using config firewall proxy-policy. Also, enhance the set empty-cert-action setting by adding an accept-unmanageable option to allow unmanageable clients to continue ZTNA proxy rule processing.
809701 Support auto revision backup on FortiSwitch upon log out or firmware upgrade in FortiLink mode (both settings are disabled by default).

config switch-controller switch-profile
    edit <name>
        set revision-backup-on-logout {enable | disable}
        set revision-backup-on-upgrade {enable | disable}
    next
end
812209 This enhancement builds on the AWS SDN connector, which uses the AWS security token service (STS) to connect to multiple AWS accounts concurrently. To enhance security, the SDN connector supports the use of an External ID, which allows the target account owner to permit the role to be assumed by the source account only under specific circumstances.
813346 Improve GTPv2 message filtering to include all GTPv2 message types, based on 3GPP TS 29.274. Also, by adding message types UE Registration Query request (61) and UE Registration Query response (62), FortiOS Carrier can now filter all GTPv0 and GTPv1 message types based on 3GPP release 3GPP TS 29.060.

Główne zmiany w 7.2.1 (CLI):

Bug ID Description
750230 Add support for up to 30 virtual clusters (previously, only two were supported). The vcluster2 and config secondary-vcluster settings have bee replaced.

 config system ha
    set vcluster-status enable
    config vcluster
        edit <id>
            ...
        next
    end
end
773524 Add option to configure whether the banned IP list persists through a power cycle.

config firewall global
    set banned-ip-persistency {disabled | permanent-only | all}
end

The diagnose user quarantine <parameter> command has changed to diagnose user banned-ip <parameter>.

789554 Consolidate the FGSP settings by moving the previous config system cluster-sync settings into a subtable under config system standalone-cluster.

Old syntax:

config system cluster-sync
    edit <id>
        set peervd <VDOM>
        set peerip <address>
        set syncvd <VDOM>
        config session-sync-filter
            ...
        end
    next
end

New syntax:

config system standalone-cluster
    config cluster-peer
        edit <id>
            set peervd <VDOM>
            set peerip <address>
            set syncvd <VDOM>
            config session-sync-filter
                ...
            end
        next
    end
end
795943 NetFlow collector and source IPs can be configured as an IPv4 or IPv6 address. This is supported in VDOM mode within global and VDOM configurations.

config system netflow
    set collector-ip <IPv4/IPv6_adddress>
    set source-ip <IPv4/IPv6_adddress>
end
798305 For non-hyperscale VDOMs, extend the maximum PBA timeout to 86400 seconds (3 – 86400, default = 30):

config firewall ippool
    edit <name>
        set pba-timeout <integer>
    next
end

For CGNAT cases, extending the PBA timeout allows PBA logs to be generated less frequently on the FortiGate.

799832 For webhook, aws-lambda, azure-function, google-cloud-function, and alicloud-function automation actions, change the headers attribute to a http-headers configurable subtable (instead of a PARSE_F_MEMBER attribute) so the subtable entries are a key-value pair that can be variable sized strings.

config system automation-action
    edit <name>
        set action-type {webhook | aws-lambda | azure-function | google-cloud-function | alicloud-function}
        config http-headers
            edit 1
                set key <string>
                set value <string>
            next
            edit 2
                set key <string>
                set value <string>
            next
        end
    next
end
801707 Remove the ike-monitor, ike-monitor-interval, ike-heartbeat-interval, and ike-use-rfc6311 settings from config system cluster-sync.

Główne zmiany w 7.2.1 (GUI):

Bug ID Description
739194 Add a time frame selector to the log viewer pages, so the logs can be loaded more efficiently.

  • Logs sourced from FortiAnalyzer and FortiCloud have the same time frame selection options as FortiView.
  • Logs sourced from disk have options to select 5 minutes, 1 hour, 24 hours, 7 days, or None.
753095 Add visibility for configuring advanced options for wireless features in the FortiGate wireless controller GUI:

  • Add navigation entries under the WiFi & Switch Controller menu:
    • Operation Profiles: includes tabs to configure FortiAP, QoS, and FortiAP configuration profiles
    • Connectivity Profiles: includes tabs to configure MPSK and bonjour profiles
    • Protection Profiles: includes tabs to configure WIDS and L3 firewall (also known as L3 access control list configurations for FortiAPs) profiles
  • Additional advanced options for wireless features under the SSIDs and WiFi Settings entries.
753107 Add IoT device information to the Security Fabric > Asset Identity Center page, including the device name, software OS, hardware vendor, status, IP address, hostname, time last seen, port, VLAN, and so on.
758549 Enhance the Managed FortiExtenders tab on the Network > FortiExtenders page with additional monitoring features:

  • Add two charts for displaying Status and Mode.
  • Update Status column with Online, Offline, and Waiting For Authorization states.
  • Add default Details column populated with the data used by the modem/SIM card when FortiExtender is in WAN extension mode, or the connected IPsec tunnel used with the FortiGate when FortiExtender is in LAN extension mode.
  • When FortiExtender is in WAN extension mode, display modem information by left-clicking or hovering the mouse over the FortiExtender name to show a tooltip then clicking Diagnostics and Tools.
  • Make the Serial # column optional (previously this was a default column).

Enhance the Profile tab on the Network > FortiExtenders page with two charts for displaying Status and Mode.

761169 Update the Log & Report > System Events and Security Events pages:

  • Rename the Details tab to Logs tab.
  • Update the filters used in the log viewer to adjust the log filters and the Log Details pane.
  • Update the time frame settings for each Log & Report page so they are independent of each other.
775203 Add Network > IPAM GUI page to centralize all IP address management (IPAM) details within three new tabs: IPAM Interfaces, IPAM Rules, and IPAM Settings.

This page is only viewable on a FortiGate that is not in a Security Fabric, or on the root FortiGate in a Security Fabric. In a Security Fabric, downstream FortiGates will receive a notification to view the root FortiGate.

This new page replaces the IPAM dashboard widget and IPAM connector card within Security Fabric > Fabric Connectors, which have been removed.

When viewing the IPAM interfaces tab, IP conflict markers are displayed to notify an administrator of IPAM pool IP conflicts with manually configured IPs and prompts administrators to use the Edit Interface dialog to manually resolve the conflict by changing the interfaces’ IP/netmask settings.

779209 Advanced BGP options can be configured in the GUI on the Network > BGP page, including: the BGP neighbor local AS, hold time timer, keepalive timer, and enforcing eBGP multihop. The View in Routing Monitor buttons in the right-side of the screen can display the BGP neighbors list, the BGP IPv4 routing table, or the BGP IPv6 routing table in a slide-out window instead of redirecting to the monitor page. The Routing monitor includes an option to soft reset a neighbor from the BGP neighbors list.
797544 Enhance the Summary tabs on the System Events and Security Events pages under Log & Report:

  • Each event list footer shows the number of events related to that type.
  • In the top-left corner of the page, the number of total events is displayed. Hovering over the number displays number of events with a time stamp.
  • Clicking on any event entry or table title redirects to the log page with start and end time stamp as a filter.
  • On the System Events > Summary tab, hovering on the Total Events By Level label in the chart legend shows a tooltip of the total number of events with a time stamp.

Zmiany ogólne:

Bug ID Description
761565 Change the encryption and decryption method of backup files to AES-GCM method. The backup configuration file encrypted by the new algorithm in 7.2.1 cannot be restored on FortiGates running FortiOS 7.2.0 and earlier.
771952 The 15-day evaluation period for a FortiGate VM is replaced with a permanent evaluation VM license. When spinning up a new FortiGate VM, the user will have a choice of logging in to FortiCare to activate the VM trial or to upload a full license. Each FortiCare account is entitled to one evaluation VM license.

Limitations of the evaluation VM license include:

  • There is only support for low encryption operation, except for GUI management access and FortiManager communications.
  • There is a maximum of one CPU and 2 GB of memory.
  • There is a maximum of three interfaces, firewall policies, and routes.
  • There is no FortiCare support.

The evaluation VM license is applicable to all private cloud (VMware ESXi, KVM, and so on) and all BYOL public cloud instances.

802757 In order for unlicensed FortiGate VMs to be managed by FortiManager, FortiOS enables high encryption on the FGFM protocol for a secure connection between the FortiGate and FortiManager. Upon being added into the device manager, FortiManager can install VM licenses to the managed FortiGate VMs.

Aktualnie wspierane modele:

FortiGate FG-40F, FG-40F-3G4G, FG-60E, FG-60E-DSL, FG-60E-DSLJ, FG-60E-POE, FG-60F, FG-61E, FG-61F, FG-80E, FG-80E-POE, FG-80F, FG-80F-BP, FG-80F-POE, FG-81E, FG-81E-POE, FG-81F, FG-81F-POE, FG-90E, FG-91E, FG-100E, FG-100EF, FG-100F, FG-101E, FG-101F, FG-140E, FG-140E-POE, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-301E, FG‑400E, FG-400E-BP, FG‑401E, FG‑500E, FG-501E, FG-600E, FG-601E, FG-800D, FG‑900D, FG-1000D, FG-1100E, FG-1101E, FG-1500D, FG-1500DT, FG-1800F, FG-1801F, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-2600F, FG-2601F, FG-3000D, FG-3100D, FG‑3200D, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E, FG-3601E, FG-3700D, FG-3960E, FG‑3980E, FG-4200F, FG-4201F, FG-4400F, FG-4401F, FG-5001E, FG‑5001E1
FortiWiFi FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-81F-2R-POE, FWF-81F-2R-3G4G-POE
FortiGate Rugged FGR-60F, FGR-60F-3G4G
FortiGate VM FG-ARM64-AWS, FG-ARM64-KVM, FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG‑VM64‑GCP, FG-VM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG‑VM64‑OPC, FG‑VM64-RAXONDEMAND, FG-VM64-SVM, FG-VM64-VMX, FG-VM64-XEN
Pay-as-you-go images FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-XEN

 

Rozwiązane problemy: 

Anti Virus

Bug ID Description
722304 AV does not block malicious file uploads to the MS Exchange server (OWA).
727067 FortiGate should fix the interface between FortiGate and FortiAnalyzer for the CDR file.
794575 When FortiGate Cloud is used as a sandbox server, enabled sandbox settings do not show up or apply on AV profiles in the GUI (CLI works).
795784 Able to bypass FortiOS AV inspection on email traffic when manipulating a MIME attachment with junk and pad characters in Base64.
805655 A scanunit crash with signal 11 occurs for SMTP and QP encoding.
823677 A scanunit crash occurs on call to fg_pcre_free.

Application Control

Bug ID Description
787130 Application control does not block FTP traffic on an explicit proxy.

Data Leak Prevention

Bug ID Description
807327 A scanunit crash occurs after upgrading to 6.4.9.

DNS Filter

Bug ID Description
744572 In multi-VDOM with default system fortiguard configuration, the DNS filter does not work for the non-management VDOM.
790974 When the DNS static domain filter entry’s action set to allow, it skips DNS translation.
796052 If local-in and transparent requests are hashed into the same local ID list, when the DNS proxy receives a response, it finds the wrong query for requests with the same ID and domain.
798562 DNS filter does not work when the FortiGate is working as a DNS server.
800497 In flow mode with set status disable in the static domain filter, the entry still works when enabled in the DNS filter.

Endpoint Control

Bug ID Description
775742 Upgrade EMS tags to include classification and severity to guarantee uniqueness.

Explicit Proxy

Bug ID Description
770440 Explicit web proxy encounter lots of WAD crashes.
774442 WAD is NATting to the wrong IP pool address for the interface.
778339 Improve logic of removing HTTP Proxy-Authorization/Authorization header to prevent user credential leaking.
794124 HTTPS websites are not accessible if certificate-inspection is set in a proxy policy.
794255 Microsoft website (microsoft.com) cannot be mapped to the Microsoft-Web ISDB name for proxy policy.
796364 Renaming a ClearPass dynamic address object that is configured in a proxy policy causes the address not to be matched.
798647 Explicit web proxy firewall policy can not pass through HTTP traffic.
801602 In agentless NTLM authentication, the source IP in user domain-controller is not applied.
802829 Explicit proxy encounters a 504 timeout after CONNECT in 7.2.0 GA.
816879 Explicit proxy is not working when certificate inspection is enabled.

Firewall

Bug ID Description
599638 Get unexpected count for established session count, and diagnose firewall iprope clear does not work as expected.
677855 cmdbsrv and other processes take CPU resources upon every configuration change in devices with over ten thousand firewall policies.
750081 Traffic can pass through an EMAC VLAN interface but cannot be offloaded.
752267 Load Balance Monitor detects a server in standby mode as being down.
770383 In multi-VDOM mode, nothing is exported to the NetFlow collector.
777231 Dashboard > FortiView Traffic Shaping page sometimes displays an undefined traffic shaper. This is cosmetic and does not impact functionality.
781144 Policy & Objects > Virtual Servers page should remove the overlap check function.
791735 The number of sessions in session_count does not match the output from diagnose sys session full-stat.
794648 Cannot set src-vendor-mac in policy. The src-vendor-mac policy setting is not lost after upgrading from 7.0.5 and is still in the iprope.
794901 Unable to create a geography type address object and get a Can not be geography address when it is a member of addrgrp used by ipsec_tunnel! error.
797017 The FortiGate does not refresh the iprope group for central SNAT policies after moving a newly created SNAT policy.
797318 NAT64 is not forwarding traffic to the destination IP.
801483 Packet drops noticed in the network when FortiGate is running 7.2.0 GA.
802834 On the Traffic Shaping > Traffic Shapers tab, the Bandwidth Utilization column is empty for per-policy reverse shapers.
803270 Unexpected value for session_count appears.
803283 Firewall deny policy did nt block a session that should have been blocked (geolocation block, outgoing direction).
806113 The Traffic Shaping Policies edit dialog shows a configured reverse shaper as disabled.
806904 IPv6 source with the same 32-bit prefix always NATs to the same IPv4 address.

FortiView

Bug ID Description
787886 The tooltip for the Bandwidth column always displays the receiving bandwidth as zero on the Dashboard > FortiView Traffic Shaping page.
804177 When setting the time period to now filter, the table cannot be filtered by policy type.
811095 Threat type N/A – Static URL Filter is showing on sources that do not have the URL filter enabled.

GUI

Bug ID Description
695163 When there are a lot of historical logs from FortiAnalyzer, the FortiGate GUI Forward Traffic log page can take time to load if there is no specific filter for the time range.
740508 Bandwidth widget shows incorrect traffic on FG-40F.
746618 Export port link status is not correct on tenant VDOM FortiSwitch Ports page.
774159 Signature not found in IPS database message when editing the IPS profile from the policy.
778844 Dashboard and Managed FortiAPs pages can take a long time to load when there are over 1000 FortiAPs configured.
781310 Policy & Objects > DNAT & Virtual IPs page can take more than 30 seconds to load if there are more than 25 thousand virtual IPs.
787550 HTTPSD daemon crashes frequently with signal 6 (aborted) at api_v2_page_result.
787565 When logged in as guest management administrator, the custom image shows as empty on the user information printout.
792045 FortiGate failed to view matched endpoints after viewing it successfully several times.
798161 System -> Certificates page keeps spinning when trying to access it from Safari.
799160 Modem 1 Health is incorrectly displayed as Disconnected in the Diagnostics and Tools pane of the FortiExtenders page.
800632 Search bar on Addresses page does not complete loading and return a result when format is <IP>-<number>.
802292 Logs sourced from FortiAnalyzer Big Data show the incorrect time.
810225 An undefined error is displayed when changing an administrator password for the first time. Affected models: NP7 platforms.

HA

Bug ID Description
722703 ISDB is not updating; last update attempt is stuck at an older date.
734040 Need a way for FortiManager to retrieve an HA-specific configuration of a secondary device through the primary device.
744033 HA out-of-sync messages appear in logs instead of sync messages when the FortiGate is in synchronization.
750087 Multicast convergence on HA failover.
750978 Interface link status of HA members go down when cfg-revert tries to reboot post cfg-revert-timeout.
779180 FGSP does not synchronize the helper-pmap expectation session.
779587 When an authentication log on length is longer than the hasync packet length and when there is a large number of logons, hasync is busy.
781463 FortiGate does not respond to ARP request for management-ip on interface if the interface IP is changed.
782734 Cluster is out-of-sync due to switch controller managed switch checksum mismatch.
786592 Failure in self-pinging towards the management IP.
794707 Get invalid IP address when creating a firewall object in the CLI; it synchronized to the secondary in FGSP standalone-config-sync.
799659 Unusually large uptime and HA behavior occurs.
799765 Multicast is failing after HA failover.
801872 Unexpected HA failover on AWS A-P cluster when ipsec-soft-dec-async is enabled.
803354 After HA-AP failover, the FortiExtender WAN interface of the new primary cannot get the LTE IP address from FortiExtender.
803697 The ha-mgmt-interface stops using the configured gateway6.
805663 After upgrading, rebooting the primary in HA (A-A) results in unusually high bandwidth utilization on redundant interfaces.
807322 AWS HA does not update the prefix list in the route table.
810175 set admin-restrict-local is not working for SSH.
812090 FGCP with in-band management mode does not send logs to newly added syslog server after being switched from out-of-band.
816883 High CPU usage on secondary device, and CPU lacks the AVX feature needed to load libdpdk.so.

Hyperscale

Bug ID Description
810025 Using EIF to support hairpinning does not work for NAT64 sessions.

Intrusion Prevention

Bug ID Description
698247 Flow mode web filter ovrd crashes and socket leaks in IPS daemon.
771000 High CPU in all cores with device running with one interface set as a one-arm sniffer.
779377 IPS fails to load a configuration if an NGFW policy uses the unrated category group or category of 0.
796094 EMAC VLAN traffic egresses with the wrong MAC address.
809691 High CPU usage on IPS engine when certain flow-based policies are active.
813998 IPv6 static routes are not generated for IP-based URL entries in one-arm IPS URL filtering solution.

IPsec VPN

Bug ID Description
765868 The packets did not pass through QTM, and SYN packets bypass the IPsec tunnel once traffic is offloaded. Affected platforms: NP7 models.
771935 Offloaded transit ESP is dropped in one direction until session is not deleted.
773221 Traffic that goes through IPsec based on a loopback interface cannot be offloaded.
775011 In VPN peering using IKEv2, the signature and aes256-sha256 proposals fail between the FortiGates and Palo Alto firewalls.
781403 IKE is consuming excessive memory.
787949 FortiGate sends duplicate SNMP traps if the tunnel is brought down on the local side.
790486 Support IPsec FGSP per tunnel failover.
793863 File downloads over L2TP IPsec VPN failed when using the VIP mapped to the internal server.
796546 IPv6 traffic through IPsec tunnel from learned BGP routes is not forwarding to Prisma Cloud provider.
798709 Shortcut fails to be triggered by interested traffic.
803336 VPN certificate private key changes on SCEP renewal.
803686 Tooltip in Dashboard > Network IPsec widget only displays one address for the local and remote addresses of the phase 2 selector.
810988 GUI does not allow IP overlap for a tunnel interface when allow-subnet-overlap is enabled (CLI allows it).
814366 There are no incoming ESP packets from the hub to spoke after upgrading.
815969 Cannot apply dialup IPsec VPN settings modifications in the GUI when net-device is disabled.

Log & Report

Bug ID Description
692237 FortiOS is truncating the group field to 35 characters in traffic logs.
699019 The source IP under config log fortiguard setting is not respected.
740157 Event log is missing when the FortiGate Cloud Sandbox server is connected, disconnected, or switched.
769300 Traffic denied by security policy (NGFW policy-based mode) is shown as action="accept" in the traffic log.
770352 On the Log & Report > Forward Traffic page, filters applied to an interface name with a comma (,) do not show the correct filtered results for that interface.
781357 Add upgrade code for using free-style filter in miglogd for FortiOS 7.0 and later.
788724 The secondary FortiGate did not send the logs to the syslog server (sendmmsg failed to send data).
789459 Empty log Summary tab for System Events and Security Events pages.
790893 Logging filters do not work as expected.
795595 Date/Time filter changes after setting the time.
797789 FortiGate goes into conserve mode because fgtlogd occupies too much memory.
803262 Anti-spam logs are empty when the log source is FortiCloud (adding a time filter may return a result).
806914 RADVD unloaded interface message appears in system event log when changing a configuration on the FortiGate.
814427 FortiGate error in FortiAnalyzer connectivity test on secondary device after upgrade.

Proxy

Bug ID Description
678815 WAD crashes with signal 11 if the client sends a client hello containing a key share that does not match the key share that the server prefers.
760471 WAD crashes and there is high memory after upgrading.
766158 Video filter FortiGuard category takes precedence over allowed channel ID exception in the same category.
768278 WAD crashes frequently, authentication stops, and firewall freezes once proxy policy changes are pushed out.
781161 WAD has signal 11 crash due to invalid reading after freeing WAD user information daemon.
785927 WAD process keeps crashing with signal 6.
786939 The scan-botnet-connections block setting does not work for TCP:443 with proxy-based inspection.
789703 WAD continually crashing at signal 11.
791662 FortiGate is silently dropping server hello in TLS negotiation.
792505 Memory leak identified for WAD worker dnsproxy_conn causing conserve mode.
793651 A revoked certificate should not be able to be used for deep inspection.
795321 WAD crash signal 11 and unit goes into conserve mode.
796910 Application wad crash (Segmentation fault) , which is the first crash in a series.
800125 Even if the policy is set to deny FTP_PUT, file uploads are permitted when the UTM feature is enabled.
802935 FortiGate cannot block a virus file when using the HTTP PATCH upload method.
803136 thumbnailPhoto files are saved in the memory disk with the incorrect hash name.
803260 Memory increase suddenly and is not released until rebooting.
803380 Device is consuming high memory and going in conserve mode, possible due to a WAD memory leak.
807332 WAD does not forward the 302 HTTP redirect to the end client.
807431 File from AWS S3 fails to download with UTM, deep inspection, and proxy configured.
808072 When accessing a specific website using UTF8 content encoding (which is unexpected according to the RFC) the FortiGate blocks the traffic as an HTTP evasion when applying an AV profile with deep inspection.
809346 FTPS helper is not opening pinholes for expected traffic for non-standard ports.
811259 WAD memory leak occurs with IPS enabled.
815313 WAD crash at wad_ssl_cert_check_auth_status once during stress testing.
817750 WAD daemon keeps crashing when web proxy forward server group does not have a server list.
822271 Unable to access a website when deep inspection is enabled in a proxy policy.
823814 Found WAD crash at signal 11 on wad_http_engine.c when ap.empty-cert-action is set to accept-unmanageable.

Routing

Bug ID Description
618684 Static route will still in routing table after HA failover, and the BFD is down on the new primary.
704322 After configuring static routes on IPsec tunnels using the Network > Static Routes page, an unnecessary warning icon appears.
720618 Passive health check is not report packet loss when it occurs in the network.
756955 Routing table does not reflect the new changes for the static route until the routing process is restarted when cmdbsrv and other processes take CPU resources upon every configuration change in devices with over ten thousand firewall policies.
769523 Multicast is not working in VRRP.
774136 VPN traffic is not being metered by DoS policy when using SD-WAN.
779113 When a link monitor fails, the routes indicated in the link monitor are not withdrawn from the routing database.
787487 Default priority value in static route is set as 0, even though the range is 1- 65535 in transparent mode.
788793 Unable to receive BGP routes on redundant tunnel interfaces.
795213 On the Network > SD-WAN page, adding a named static route to an SD-WAN zone creates a default blackhole route.
796070 Incorrect SD-WAN kernel routes are used on the secondary device.
796409 GUI pages related to SD-WAN rules and performance SLA take 15 to 20 seconds to load.
797530 SD-WAN health check event log shows the incorrect protocol.
797590 GRE tunnel configured using a loopback interface is not working after changing the interface back and forth.
798245 ICMP traffic is using the incorrect VRF.
805285 SIP-RTP fails after a route or interface change.
806939 Routing issue with ADVPN and SD-WAN if IPsec aggregate interfaces are configured.
807635 BGP routes hit the wrong route map.
808840 After cloning a static route, the URL gets stuck with "clone=true".
809321 IS-IS LSP packets do not include the checksum and the authentication key ([Checksum: [missing]], [Checksum Status: Not present] and authentication "hmac-md5 (54), message digest]).
812982 SD-WAN performance SLAs on a dialup IPsec VPN tunnel do not work as expected.
817670 IPv6 route redistribution metric value is not taking effect.

Security Fabric

Bug ID Description
614691 Slow GUI performance in large Fabric topology with over 50 downstream devices.
697160 ACI connector does not import IPv6 addresses.
741084 Entry-level FortiGate with Security Fabric enabled for 30 or more downstream FortiGates can go into conserve mode when loading the physical or logical topology pages, or running security rating reports.
753742 Add distributed security rating and topology reports.
778511 PPPoE interface is unable to accept Fabric connections.
782518 Threat feeds are showing that the connection status has not started when it should be connected.
788543 Topology tree shows No connection or Unauthorized for FortiAnalyzer while sending log data to FortiAnalyzer.
791324 Test Automation Stitch function only works on the root FortiGate, and is not working on the downstream FortiGate.
795687 On the Fabric Management page, some managed FortiSwitches are not shown.
799832 GCP bearer token is too long for the header in a google-cloud-function automation action.
801048 During the FortiOS initialization process, there is a small chance that other services using UDP take the specific port that caused csfd initialization to fail.
803600 Automation stitch for a scheduled backup is not working.
807967 Add reliable message for creating event logs on upstream device for use by Report Runner.
815984 Azure SDN connector has a 403 error when the AZD restarts.

SSL VPN

Bug ID Description
486837 SSL VPN with external DHCP servers is not working.
616896 Link in SSL VPN portal to FortiClient iOS redirects to legacy FortiClient 6.0 rather than the latest 6.2.
626311 SSL VPN users are remaining logged on past the auth-timeout value.
676278 Custom host check AV and firewall for macOS fails for FortiClient SSL VPN.
677031 SSL VPN web mode does not rewrite playback URLs on the internal FileMaker WebDirect portal.
697142 SharePoint server (de***.sc***.gov.sa) is not working on web-based VPN.
757726 SSL VPN web portal does not serve updated certificate.
763611 If dual-stack is enabled, the user connects to the tunnel with IPv6 and the tunnel is established successfully. When the user tries to access the IPv4 server to upload or download files, the network speed is very slow.
767832 After upgrading from 6.4.7 to 7.0.1, the Num Lock key is turned off on the SSL VPN webpage.
767869 SCADA portal will not fully load with SSL VPN web bookmark.
768323 Certain websites do not load properly in SSL VPN web mode.
768983 SSL VPN web mode access to the FortiGate GUI is slow after upgrading.
778034 FortiGate GUI in SSL VPN web mode is very slow.
780305 SSL VPN web mode is unable to redirect from port 62843 to port 8443.
780765 High CPU usage in SSL VPN using libssh2.
781581 Customer internal website is not shown correctly in SSL VPN web mode.
784887 A blank page appears after logging in to an SSL VPN bookmark.
787978 Unable to load NFMT routing display through SSL VPN web mode.
789117 SSL VPN web mode RDP bookmark always asks for credentials.
789267 SSO SSL VPN web mode user cannot connect to RDP intermittently.
789642 Unable to load Grafana application through SSL VPN web mode.
791700 SSL VPN crashes and disconnects users at the same time.
792075 SSL VPN web portal does not load internal e-learning website content.
792944 Internal redirect webpage is not working in SSL VPN web mode.
794800 SSL VPN /remote/logoutok screen loads in basic text.
794820 Slow performance to manage FortiGate trough the bookmark configured in SSL VPN web mode.
795730 Non-Google CAPTCHA cannot be displayed in SSL VPN web mode.
796768 SSL VPN RDP is unable to connect to load-balanced VMs.
797136, 797139 Internal site does not load completely using SSL VPN web mode bookmark.
799308 SSL VPN bookmark is not working.
799780 Website is not loading in SSL VPN web mode.
800751 Unable to download files over 2 GB to and from an SMB file share using SSL VPN web mode.
801308 FortiGuard should only provide an installer for FortiClient VPN, instead of the full FortiClient version.
801588 After Kronos (third-party) update from 8.1.3 to 8.1.13, SSL VPN web portal users get a blank page after logging in successfully.
802379 SSL VPN has memory leaks and crashes.
803576 Comments in front of <html> tag are not handled well in HTML file in SSL VPN web mode.
803622 High CPU in SSL VPN once SAML is used with FortiAuthenticator and an LDAP server.
806143 JavaScript error in SSL VPN web mode.
807268 Many SSL VPN users are disconnected periodically, and sslvpnd crashes.
808569 sslvpnd crashes when no certificate is specified.
809209 SSL VPN process memory leak is causing the FortiGate to enter conserve mode over a short period of time.
809473 When sslvpnd debugs are enabled, the SSL VPN process crashes more often.
810715 Web application is not loading in the SSL VPN web mode.
811007 SSL VPN realm display is incorrect.
811492 SSL VPN should not leak information while performing Telnet.
812006 The PROD-MDN-WS1 SSL VPN portal is not loading properly, and cannot navigate within the page.
814040 SSL VPN bookmark configuration is added automatically after client logs in to web mode.
814708 The same SAML user failed to establish a tunnel when a stale web session exists with limit-user-logins enabled.
816716 sslvpnd crashed when deleting a VLAN interface.
816881 TX packet loss on ssl.root interface.
817843 Logging out of SSL VPN tunnel mode does not clear the authenticated list.
826582 SSH via SSL VPN web mode does not work for some SSH servers.

Switch Controller

Bug ID Description
774441 FortiLink topology only displays partially.
794026 FortiGates quarantines are stuck at 256.
799860 FortiSwitch online/offline status is not consistent between the CLI and SNMP.
803307 The Enable STP security control description should be reworded to mention that Edge ports should have STP enabled once the network topology is stable.
805154 Switch controller preconfiguration of FortiSwitch 108F-POE is incorrect.
810550 Send DHCP/ARP packet failed, and get errno = 6 in log when config-sync runs.

System

Bug ID Description
540389 Remote administrator password renewal shows remote token instead of new password (CLI and GUI).
716250 Incorrect bandwidth utilization traffic widget for VLAN interface based on LACP interface.
725273 application newcli crashed with *** signal 11 (Segmentation fault) received ***.
734912 When VDOMs are enabled, changing system settings causes the GUI to display a failure to save message.
736144 AirCard 340U LTE Modem does not work.
743831 When global daylight saving time (DST) is disabled, the system time in the GUI still shows the time with DST.
753912 FortiGate calculates faulty FDS weight with DST enabled.
756139 When split port is enabled on four 10 GB ports, only one LACP port is up, and the other ports do not send/receive the LACP PDU.
758490 The value of the extra-init parameter under config system lte-modem is not passed to the modem after rebooting the device.
761971 AirCard 340U LTE modem does not work on FG-61F.
764483 After restoring the VDOM configuration, Interface <VLAN> not found in the list! is present for VLANs on the aggregate interface.
766058 FortiGate central management is configured on the backup mode ADOM, and any changes done on the FortiGate are not recorded in the FortiManager.
771331 Incorrect bandwidth utilization traffic widget for VLAN interface on NP6 platforms.
773829 Get /bin/cid crash when cid.tar.gz cannot be unpacked.
782392 ICMP traceroute with more than one probe is not working, and drops are seen on NP6 platforms.
783939 IPv4 session is flushed after creating a new VDOM.
786255 Cached topology reports causes the FortiGate to run out of flash storage on low-end models.
786998 When enabling the decrypted-traffic-mirror option on a VXLAN interface, the collector device will get a TCP Out-Of-Order packet.
787557 Sudo command is not working inconsistently.
787595 FFDB cannot be updated with exec update-now or execute internet-service refresh after upgrading the firmware in a large configuration.
789153 A profile with higher privileges than the user’s own profile can be set.
789203 High memory usage due to DoT leak at ssl.port_1way_client_dox leak\wad_m_dot_conn leak\sni leak when the DoX server is 8.8.8.8.
790656 DNS fails to correctly resolve hosts using the DNS database.
792544 A request is made to the remote authentication server before checking trusthost.
793864 Repeated FortiDDNS failed messages are in the system event logs output.
796398 BPDUs packets are blocked even though STF forwarding is enabled on FG-800D in transparent mode (UTP and SFP).
797428 SNMP status for NPU is not available on NP6xlite.
799255 Any configuration changes on FG-2601F causes cmbdr crash with signal 6 and traffic to stop flowing.
799487 The debug zone uses over 400 MB of RAM.
800294 Interface migration wizard does not work when VLANs have dependencies within dependencies.
800295 NTP server has intermittent unresolvable logs after upgrading to 6.4.
801053 FG-1800F existing hardware switch configuration fails after upgrading.
801474 DHCP IP lease is flushed within the lease time.
801738 Kernel panic occurs on FG-2610F when collecting debug flow information.
802917 PPPoE virtual tunnel drops traffic after logon credentials are changed.
805412 DHCPv6 authentication option offer is not accepted from the server.
805644 Trunk port is removed from the VLAN switch after rebooting.
807947 Unable to create new interface and VDOM link with names that contain spaces.
810583 Running diagnose hardware deviceinfo psu shows the incorrect PSU slot.
810622 Message regarding VDOM names longer than 11 characters is shown when set long-vdom-name is enabled.
811449 New DNS system servers with DoT enabled, applying a DNS filter to the FortiGate DNS server fails.
812499 When traffic gets offloaded, an incorrect MAC address is used as a source.
813223 Random kernel panic occurs due to calling timer_setup.
813606 DHCP relay offers to iPhones is blocked by the FortiGate.
815360 NP7 platforms may encounter a kernel panic when deleting more than two hardware switches at the same time.
816278 Memory increase due to iked process.
818461 When an aggregate is created after all VLANs and added to a software switch, all VLANs are lost after rebooting.
819640 SSH public key changes after every reboot.
821773 Manual license for air-gap environments is lost after rebooting the FortiGate.

Upgrade

Bug ID Description
792831 [2062] fap_fsw_lst_req: buf of https is too small: 853 debug message appears in console when upgrading to certain builds.
803171 Upgrade takes longer than expected, and get daemon_bits=0x00000040 error when HA upgrades.

User & Authentication

Bug ID Description
667150 Add GUI support for FortiToken Mobile push notification and FortiToken Cloud based on two-factor authentication, which is already supported by authd.
738846 FAS ends up in endless loop while synchronizing with LDAP when a special character (,) is part of a username.
760740 REVERSE_INULL found in WanOpt explicit proxy, wad_user_info.c:wad_group_info_cache_free.
778521 SCEP fails to renew if the local certificate name length is between 31 and 35 characters.
782158 The ç character is not accepted by an LDAPS password change.
790941 When logged in with an administrator profile using a wildcard RADIUS user, creating a new dashboard widgets fails.
792924 Incorrect captive portal page certificate is used after upgrading.
804133 The diagnose test guest del <group_name> <user_ID> command does not work after upgrading.
808884 Device information is not fully detected on NP7.
810033 The samld process is killed if the SP certificate set has an ECC 384-bit public key.
813355 Additional information from user ID login should be displayed.
813407 Captive portal authentication with RADIUS user group truncates the token code to eight characters.
813987 No traffic is generated when creating an ACME certificate that uses a domain name with an uppercase letter.

VM

Bug ID Description
782073 IBM HA is unable to fail over route properly when route table has a delegate VPC route.
786278 Bandwidth usage is not shown when DPDK is enabled.
799536 Data partition is almost full on FG-VM64 platforms.
803219 Azure SDN connector might miss dynamic IP addresses due to only the first page of the network interface being processed.
809963 Get cmdbsvr crash after concurrent performance test on FG-KVM32.

VoIP

Bug ID Description
794517 VoIP daemon memory leak occurs when the following conditions are met:

  • The SIP call is on top of the IPsec tunnel.
  • The call fails before the setup completes (session gets closed in a state earlier than VOIP_SESSION_STATE_RUNNING).

WAN Optimization

Bug ID Description
804662 WANOpt tunnels are not established for traffic matching the profile.

Web Application Firewall

Bug ID Description
795554 Inspecting all ports in an SSL/SSH inspection profile does not work with the WAF profile.

Web Filter

Bug ID Description
743195 Disclaimer module does not load and breaks the website.
786448 Web filtering with WISP functionality is intermittent in flow mode.
798557 When a new URL filter entry is created and the list is re-ordered, the list position is not maintained.
801792 IPS daemon has socket FD leaks.

WiFi Controller

Bug ID Description
790367 FWF-60F has kernel panic and reboots by itself every few hours.
796036 Manual quarantine for wireless client connected to SSID on multi-VDOM with wtp-share does not work.

ZTNA

Bug ID Description
792829 WAD re-challenges user authentication upon HA failover.
797433 WAD treats ZTNA SAML URL with multiple query characters as invalid and closes.
799530 Found wad crash at wad_sched.c upon device tag matching.
799759 Applying a ZTNA rule in the GUI removes configured IP pools.
802715 ZTNA failed to match the policy when a tag is found for an endpoint in the EMS response.

 

Znane problemy:

Anti Virus

Bug ID Description
818092 CDR archived files are deleted at random times and not retained.

Application Control

Bug ID Description
804138 Application icon is missing when FortiGuard anycast is set to AWS (unable to resolve globalproductapi2.fortinet.net).

Firewall

Bug ID Description
719311 On the Policy & Objects > Firewall Policy page in 6.4.0 onwards, the IPv4 and IPv6 policy tables are combined but the custom section name (global label) is not automatically checked for duplicates. If there is a duplicate custom section name, the policy list may show empty for that section. This is a display issue only and does not impact policy traffic.

Workaround: rename the custom section to unique name between IPv4 and IPv6 policies.

770541 There is a delay opening firewall, DoS, and traffic shaping policies in the GUI.

FortiView

Bug ID Description
798427 Change the sandbox PDF report query to be on-demand.

GUI

Bug ID Description
651648 Searching for address groups on the Addresses page and address dialog is slow due to recursive algorithm.
677806 On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows the correct status.
685431 On the Policy & Objects > Firewall Policy page, the policy list can take around 30 seconds or more to load when there is a large number (over 20 thousand) of policies.

Workaround: use the CLI to configure policies.

780832 Managed FortiAPs list fails to load if there is an invalid or unsupported FortiAP.
820909 When configuring a new One Time schedule in GUI, if the End Date is set to the 31st day of the month, it goes back to first day of the month.
831439 Multiple DHCP servers for the same range can be configured on an interface if the interface name contains a comma (,) character.

Hyperscale

Bug ID Description
804742 After changing hyperscale firewall policies, it may take longer than expected for the policy changes to be applied to traffic. The delay occurs because the hyperscale firewall policy engine enhancements added to FortiOS 7.2.1 may cause the FortiGate to take extra time to compile firewall policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The delay is affected by hyperscale policy set complexity, the total number of established sessions to be re-evaluated, and the rate of receiving new sessions.
824733 IPv6 traffic continues to pass through a multi-VDOM setup, even when the static route is deleted.
829549 DSE entry is being created for ALG sessions, and EIF sessions pass through.

Intrusion Prevention

Bug ID Description
813727 Custom signatures are not shown in the list when filters (server, client, or critical severity) are applied in an IPS sensor.

IPsec VPN

Bug ID Description
699973 IPsec aggregate shows down status on Interfaces, Firewall Policy, and Static Routes configuration pages.
761754 IPsec aggregate static route is not marked inactive if the IPsec aggregate is down.
819276 After changing the password policy to enable it, all non-conforming IPsec tunnels were wiped out after rebooting/upgrading.

Limitations

Bug ID Description
617042 ACI dynamic address table size is limited to 1000 entries on FortiGate per EPG.

Log & Report

Bug ID Description
807661 In a FortiAnalyzer with lots of logs, the log view shows no result if the user scrolls down to the bottom of the list.
815150 Negating a range or subnet does not work on in the GUI log display.
820940 On the Log Settings page, a VDOM administrator can force a FortiCloud log out of for all VDOMs.
821359 FortiGate appears to have a limitation in the syslogd filter configuration.
826483 The dstname log field cannot store more than 66 characters.

Proxy

Bug ID Description
823247 WAD user_info process leaks memory.

Routing

Bug ID Description
792512 Dashboard session widget shows IPv6 sessions from another VDOM (this is a REST API issue, the CLI is OK).

Security Fabric

Bug ID Description
794703 Security Rating report for Rogue AP Detection and FortiCare Support checks show incorrect results.
814796 The threat level threshold in the compromised host trigger does not work.

SSL VPN

Bug ID Description
795381 FortiClient Windows cannot be launched with SSL VPN web portal.
819296 GUI should not use <server_ip> as a sender to send the SSL VPN configuration (it should use value set in reply-to).

Switch Controller

Bug ID Description
798724 FortiSwitch exported ports in tenant VDOM are gone after rebooting the FortiGate.
813216 FortiLink goes down when CAPWAP offloading is enabled or disabled.
818116 Add link status to managed FortiSwitch switch ports.

System

Bug ID Description
725048 Performance improvements for /api/v2/monitor/system/available-interfaces (phase 2).
776646 Configuring a delegated interface to obtain the IPv6 prefix from an upstream DHCPv6 server in the GUI fails with a CLI internal error.
798091 After upgrading from 6.4.9 to 7.0.5, the FG-110xE’s 1000M SFP interface may fail to auto-negotiate and cannot be up due to the missed auto-negotiation.
799570 FG-200F has high memory usage after rebooting.
809366 FG-40F with STP enabled on a hardware switch creates a loop after upgrading.

Upgrade

Bug ID Description
803041 Link lights on the FG-1100E fail to come up and are inoperative after upgrading.

VM

Bug ID Description
825464 Every time the FortiGate reboots, the certificate setting reverts to self-sign under config system ftm-push.

WiFi Controller

Bug ID Description
688655 Adding an AP results in the cluster going out-of-sync due to different UUID values in the WTP profiles.
789072 Kernel panic on FWF-61F due to ol_target_failure, Target Register Dump Location 0x00401AE0.
807713 FortiGate is not sending RADIUS accounting message consistently to RADIUS server for wireless SSO.
811953 Configuration installation from FortiManager breaks the quarantine setting, and the VAP becomes undeletable.
821803 The cw_acd process spikes at 99%, the FortiGate reports hostapd crashes, and all FortiAPs are showing as being offline.

 

Notatki producenta: FortiOS 7.2.1

Pozdrawiamy,

Zespół B&B
Bezpieczeństwo w biznesie

Post Views: 1 182

FortiNAC FortiOS fortios 7.2 fortios 7.2.1

Poprzedni artykułESET PROTECT 9.1.18.2 HotfixNastępny artykuł VMware ESXi 7.0 Update 3g

Najnowsze

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kategorie

  • Acronis
  • Aktualności
  • Bez kategorii
  • ESET
  • F-Secure
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiClient
  • FortiDeceptor
  • FORTIGATE
  • FORTIMAIL
  • FortiManager
  • FortiNAC
  • FortiSIEM
  • FORTISWITCH
  • FortiWeb
  • NAKIVO
  • Proget
  • Qnap
  • Stormshield
  • Szkolenia
  • Veeam
  • VMware
  • WithSecure

Tagi

6.0.6 6.2.2 6.2.7 6.4.0 6.4.4 6.4.5 6.4.8 7.0.0 7.0.2 7.0.5 7.2.0 7.2.2 ems Eset eset endpoint antivirus eset endpoint security ESET Inspect ESET Protect ESET Protect Cloud F-Secure FMG FortiAnalyzer forti analyzer FortiAP fortiap-w2 FortiAuthenticator FortiClient FortiClientEMS forticlient ems FortiGate FortiMail FortiManager FortiNAC Fortinet FortiOS FortiSIEM FortiSwitch FortiWeb vCenter vCenter Server VMware VMware ESXi vmware esxi 8.0 vmware vcenter VMware vCenter Server

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

KONTAKT

biuro@b-and-b.plhttps://www.b-and-b.pl
8:00-16:00
RODO | POLITYKA PRYWATNOŚCI
OGÓLNE WARUNKI REKLAMACJI

BEZPIECZEŃSTWO W BIZNESIE 2025 - wszystkie prawa zastrzeżone

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kontakt

+48 500-413-313
biuro@b-and-b.pl
8:00-16:00
Add new entry logo

Korzystamy z plików cookies lub podobnych technologii, by lepiej dopasować treści na stronie do Twoich potrzeb. W każdej chwili możesz zmienić ustawienia cookies. Polityka prywatności

Akceptuję Odmów
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
  • Always Active
    Necessary
    Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

  • Marketing
    Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

  • Analytics
    Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

  • Preferences
    Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

  • Unclassified
    Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.