B&B Bezpieczeństwo w biznesie
  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

FortiOS 7.4.1 jest dużą aktualizacją, która wprowadza wiele zmian w różnych obszarach. Poprawiono i dodano kilka funkcji w CLI, zmiany dotknęły także GUI i jego zachowanie. Ponadto zmianom uległa  obsługa routingu między sieciami VLAN przez FortiSwitch. Zwiększono bezpieczeństwo Security Fabric obsługując uwierzytelnianie i szyfrowanie na wszystkich łączach Fabric. Więcej informacji można znaleźć w artykule poniżej.

Aktualizacja jest dostępna dla poniższych modeli urządzeń FortiGate:

FortiGate FG-40F, FG-40F-3G4G, FG-60E, FG-60E-DSL, FG-60E-DSLJ, FG-60E-POE, FG-60F, FG-61E, FG-61F, FG-70F, FG-71F, FG-80E, FG-80E-POE, FG-80F, FG-80F-BP, FG-80F-POE, FG-81E, FG-81E-POE, FG-81F, FG-81F-POE, FG-90E, FG-91E, FG-100F, FG-101F, FG-140E, FG-140E-POE, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-301E, FG‑400E, FG-400E-BP, FG‑401E, FG-400F, FG-401F, FG‑500E, FG-501E, FG-600E, FG-601E, FG-600F, FG-601F, FG-800D, FG‑900D, FG-1000D, FG-1100E, FG-1101E, FG-1800F, FG-1801F, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-2600F, FG-2601F, FG-3000D, FG-3000F, FG-3001F, FG-3100D, FG‑3200D, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E, FG-3601E, FG-3700D, FG-3960E, FG‑3980E, FG-4200F, FG-4201F, FG-4400F, FG-4401F, FG-5001E, FG‑5001E1, FG-6000F, FG-7000E, FG-7000F
FortiWiFi FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-81F-2R-POE, FWF-81F-2R-3G4G-POE
FortiGate Rugged FGR-60F, FGR-60F-3G4G, FGR-70F, FGR-70F-3G4G
FortiFirewall FFW-3980E, FFW-VM64, FFW-VM64-KVM
FortiGate VM FG-ARM64-AWS, FG-ARM64-AZURE, FG-ARM64-GCP, FG-ARM64-KVM, FG-ARM64-OCI, FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG‑VM64‑GCP, FG-VM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG‑VM64‑OPC, FG‑VM64-RAXONDEMAND, FG-VM64-XEN

FortiGate 6000 and 7000 support

FortiOS 7.4.1 supports the following FG-6000F, FG-7000E, and FG-7000F models:

FG-6000F FG-6300F, FG-6301F, FG-6500F, FG-6501F
FG-7000E FG-7030E, FG-7040E, FG-7060E
FG-7000F FG-7081F, FG-7121F

Poniżej przedstawiamy zmiany i ulepszenia zawarte w FortiOS 7.4.1:

Cloud

Feature ID Description
912313 When integrating with Cisco ACI using a direct connection SDN connector, allow the ability to filter on the endpoint security group (ESG) when defining and resolving a dynamic address.

GUI

Feature ID Description
914305 Improve FortiConverter usability:

  • Highlight the precondition of purchasing a license.
  • Add the ability to hide the FortiConverter prompt when logging in again.
  • Put Contact Details as the first step when starting the Migrate Config with FortiConverter step.
  • Combine the upload and processing steps, with processing now happening behind the scenes.
  • Add Administrative distance option for the management interface.
  • Remove the Confirm dialog.
  • Prepopulate the same interfaces in the target configuration.
  • Rename the FortiConverter Portal to FortiConverter Service Portal.
  • Add FortiConverter on the System > FortiGuard page, regardless of whether the FortiGate has an entitlement or not.
  • Move the FortiConverter option from system to configuration.
  • Display the migrated configuration for review.
  • Automatically back up the original configuration while applying the migrated configuration to the target FortiGate.
  • Add CLI commands:
    • Use diagnose sys forticonverter get-prompt-visibility to see the visibility status of the FortiConverter wizard.
    • Use diagnose sys forticonverter set-prompt-visibility {visible | hidden} to set the visibility status of the FortiConverter wizard.

LAN Edge

Feature ID Description
847106 Support inter-VLAN routing by managed FortiSwitch. This can improve the network performance by offloading Llayer 3 routing from the FortiGate when there is high throughput routing. This feature is particularly beneficial in large production environments, where there are multiple layers of managed FortiSwitches and a vast number of end-user devices. The FortiGate expends a considerable amount of system resources to route traffic between VLANs. This feature enables the FortiGate to offload inter-VLAN traffic between end-users to managed FortiSwitches, freeing up resources on the FortiGate and boosting its performance.
862149 Enhance wireless client mode support on FortiWiFi 80F series models. When wireless client mode is successfully configured and the FortiWiFi local radio has connected to a third-party SSID, this local radio can also concurrently work in AP mode to provide service to wireless clients.
870337 Support GUI Security Rating recommendations for multi-chassis link aggregation groups (MCLAGs) up to three tiers, which is an improvement over the previous limitation of only one tier. This allows for more comprehensive security management and configuration of MCLAGs.
888123 Support automatically allowing and blocking intra-VLAN traffic based on FortiLink connectivity status. This feature introduces configuration options to control switch controller access VLAN traffic behavior when the connection to FortiLink is lost. This enables customers to have the option to allow intra-VLAN traffic under the access VLAN on all affected FortiLink until the FortiLink connection is re-established.
893194 Enhance the security of the Security Fabric by supporting authentication and encryption on all Fabric links wherever possible. This protects communication between FortiGate and FortiSwitch devices from unauthorized access and tampering, ensuring its security and integrity. It is supported on FortiLink over L2 and L3 Fabrics to ensure zero touch support.
901576 Simplify BLE iBeacon provisioning whereby the BLE major ID can be set in WTP and WTP group settings (in addition to being set in the BLE profile settings), and the BLE minor ID can be set in the WTP settings (in addition to being set in the BLE profile settings).

config wireless-controller wtp
    edit <id>
        set ble-major-id <integer>
        set ble-minor-id <integer>
    next
end
config wireless-controller wtp-group
    edit <name>
        set ble-major-id <integer>
        set wtps <wtp-id1>, <wtp-id2>, ...
    next
end

The BLE major ID defined in the WTP settings overrides the BLE major ID defined in the WTP group settings and the BLE major ID defined in the BLE profile settings.

The BLE major ID defined in the WTP group settings overrides the BLE major ID defined in the BLE profile settings.

The BLE minor ID defined in the WTP settings overrides the BLE minor ID defined in the BLE profile settings.

905910 Support new changes to the Precision Time Protocol (PTP) configuration on FortiSwitch. This allows FortiOS to manage PTP configuration changes on the FortiSwitch side while maintaining support for previous PTP configuration options.
906431 Before this enhancement, users could be assigned to VLANs dynamically according to the Tunnel-Private-Group-Id RADIUS attribute returned from the Access-Accept message, matching based on a VLAN name table defined under the virtual AP where the VLAN name supported a single VLAN ID. This enhancement allows multiple VLAN IDs to be configured per name tag, up to a maximum of eight VLAN IDs. Once wireless clients connect to the SSID, the FortiGate wireless controller can assign the VLAN ID by a round-robin method from the pool to ensure optimal utilization of VLAN resources.
909971 Support the selection of channels per frequency band for wireless foreground scans when a radio is in monitor mode. This optimizes the wireless foreground scanning operation since only selected channels are scanned.

config wireless-controller wids-profile
    edit <name>
        set ap-scan enable
        set ap-scan-channel-list-2G-5G <channel-1> <channel-2> ... <channel-x>        
        set ap-scan-channel-list-6G <channel-1> <channel-2> ... <channel-y>       
    next
end
916757 Enhance wireless client mode support on FortiWiFi 80F, 60F, and 40F series models that allows the local radio to connect with a WPA2/WPA3-Enterprise SSID and support PEAP and EAP-TLS authentication methods.

config wifi-networks
    edit <id>
        set wifi-security wpa-enterprise
        set wifi-eap-type {both | tls | peap}
        set wifi-username <string>
        set wifi-client-certificate <client_certificate>
        set wifi-private-key <client_certificate>
    next
end

The username, client certificate, and private key settings are applicable when connecting to a WPA2/WPA3-Enterprise SSID with EAP-TLS.

920968 Support MIMO mode configuration in the wireless-controller wtp-profile on all radios for FortiAP F and G series, and FortiAP-U EV and F series. The MIMO mode configuration setting is added under the radio configuration when creating or editing a wtp-profile, and its value range is confined within each AP platform and radio’s MIMO specifications (default, 1x1, 2x2, 3x3, 4x4, and 8x8).

config wireless-controller wtp-profile
    edit <name>
        config radio-<number>
            set mimo-mode <supported_modes_depend_on_FAP_platform>
        end
    next
end
931695 Integrate with Pole Star’s NAO Cloud service by supporting Pole Star BLE asset tags and forwarding their data to the cloud service. This solution allows wearables with BLE asset tags that are worn on staff and guests to communicate with FortiAPs through their built-in Bluetooth radios. The data forwarded to the cloud service is processed by Pole Star, and analytics are generated to map the location of each asset.

Log & Report

Feature ID Description
886560 Support switching to an alternate FortiAnalyzer if the main FortiAnalyzer is unavailable. Once the connectivity is restored, it will automatically fall back to the primary FortiAnalyzer.
928948 Add JSON format support for the syslogd settings.

config log syslogd setting
    set format json
end

Network

Feature ID Description
730332 Add GUI support for configuring the FortiGate controller and FortiGate connector for the FortiGate LAN extension feature.
733258 Support DNS over QUIC (DoQ) and DNS over HTTP3 (DoH3) for transparent and local-in DNS modes. Connections can be established faster than with DNS over TLS (DoT) or DNS over HTTPS (DoH). Additionally, the FortiGate is now capable of handling the QUIC/TLS handshake and performing deep inspection for HTTP3 and QUIC traffic.
765007 Support network troubleshooting with Connectivity Fault Management (CFM). With CFM, administrators can easily diagnose and resolve issues in Ethernet networks. CFM provides tools for monitoring, testing, and verifying the connectivity and performance of network segments.
829480 The „Happy Eyeballs” (also named fast fallback) algorithm, as outlined in RFC 8305, is supported for explicit web proxy. This feature operates by attempting to connect to a web server that is available at multiple IPv4 and IPv6 addresses, either sequentially or simultaneously. As a result, the web server can be connected with reduced user-visible delay, which enhances the overall browsing experience.
844004 Add GUI support for interfaces with a LAN role, wireless network interfaces, and FortiExtender LAN extension interfaces to receive an IP address from an IPAM server without any additional configuration at the interface level from the IPAM Settings tab (Network > IPAM). IPAM also detects and resolves any IP conflicts that may occur on the interfaces that it manages. If Auto-resolve conflicts is disabled in the IPAM settings, the Reallocate IP option from the tooltip can be used to manually reallocate the IP address.
865825 Support IPv6 on the cellular interface of FG-40F-3G4G devices.

config system lte-modem
    set pdptype {IPv4 | IPv6 | IPv4v6}
end
888381 On FortiGates with a cellular modem and dual SIM support, improve real-time switching to passive SIM when LTE modem traffic exceeds a specified data plan limit for a specified billing period. The SIM switch time occurs shortly after a data plan overage event occurs.

config system lte-modem
    set data-usage-tracking enable
    config sim-switch
        set by-data-plan enable
    end
    config data-plan
        edit <id>
            set target-sim-slot {SIM-slot-1 | SIM-slot-2}
            set data-limit <integer>
            set data-limit-alert <integer>
            set billing-period {monthly | weekly | daily}
            set billing-date <integer>
            set billing-weekday {sunday | monday | tuesday | wednesday | thursday | friday | saturday}
            set billing-hour <integer>
            set overage {enable | disable}
            set iccid <SIM_ICCID>
            set delay-switch-time <HH:MM>
        next
    end
end
906748 Webpages can display Cross-Origin Resource Sharing (CORS) content in an explicit proxy environment when using session-based, cookie-enabled, and captive portal assisted authentication. This ensures that webpages are displayed correctly and improves the user experience.

config authentication rule
    edit <name>
        set web-auth-cookie enable
        set cors-stateful {enable | disable}
        set cors-depth <integer>
    next
end
911412 An explicit web proxy can forward HTTPS requests to a web server without the need for an HTTP CONNECT message. The FortiGate explicit web proxy can be configured to detect the HTTPS scheme in the request line of a plain text HTTP request and forward it as an HTTPS request to the web server. This allows applications that cannot use the CONNECT message for sending an HTTPS request to communicate with the web server through an explicit web proxy.

config firewall proxy-policy
    edit <id>
        set detect-https-in-http-request {enable | disable}
    next
end
912322 Support interfaces belonging to non-management VDOMs to be the source IP of the DNS conditional forwarding server. When vdom-dns is disabled, only the IP of the interfaces in the management VDOM can be configured as the source IP. When vdom-dns is enabled, only the IP of the interfaces in the current VDOM can be configured as the source IP.
912323 Support the transparent conditional DNS forwarder and add IPv6 support for the conditional DNS forwarder.

The transparent conditional DNS forwarder allows the FortiGate to intercept and reroute DNS queries for specific domains to a specific DNS server. This provides greater control over DNS requests, especially when the administrator is not managing the DNS server configuration of the client devices. This can improve network efficiency and performance by resolving IPs local to the client’s PCs rather than IPs local to the central DNS server.

916843 The inter-VDOM link is capable of acquiring an IP address from the DHCP server. This allows for more seamless network integration.
928885 Support using the web proxy forward server over IPv6. The new IPv6-enabled forward server works the same way as the previous IPv4 forward server. For example, you can configure an IPv6 address or an FQDN that resolves to an IPv6 address for the forward server, and you can also use the IPv6 forward server in a forward server group.

config web-proxy forward-server
    edit <name>
        set addr-type {ipv6 | fqdn}
        set ipv6 <IPv6_address>
    next
end

Policy & Objects

Feature ID Description
829983 The enhanced Policy match tool retains all the functionality of its predecessor (Policy lookup) and adds the ability to return a new policy match results page based on the provided parameters. Policy match results now include web filter profile information (if a web filter is applied) and the ability to use identity-based policy matching. From the Matched Policy section in the match results, administrators can redirect to the policy list or edit the policy. The gutter area in the Policy Match Tool pane displays the top 10 recent matches. This feature provides a more comprehensive and user-friendly way to diagnose and manage policies.

The diagnose firewall iprope lookup command has been updated to specify additional parameters, including policy type (policy or proxy), and a new parameter for identity-based policy matching. The policy match feature will be activated if more than six parameters are specified in the existing diagnose command.

# diagnose firewall iprope lookup <source_ip> <source_port> <destination_ip> <destination_port> <protocol> <device> <policy_type> [<auth_type>] [<user/group>] [<server>]
892953 Support dynamic addresses in security policies in NGFW policy mode. The FABRIC_DEVICE address (a dynamic address consisting of several types of Fabric devices including FortiManager, FortiAnalyzer, FortiClient EMS, FortiMail, FortiAP, and FortiSwitch), can be used as the source or destination address in security policies.

The diagnose ips pme fabric-address list command can be used to check what address is set in the security policy after FABRIC_DEVICE is used in the address.

915924 Active sessions can be refreshed for specific protocols and port ranges per VDOM in a specified direction. This option can help prevent potential denial of service (DoS) attacks by controlling the direction of traffic that refreshes existing sessions.

config system session-ttl
    config port
        edit <id>
            set protocol <integer>
            set timeout <timeout_value>
            set refresh-direction {both | outgoing | incoming}
        next
    end
end
920927 The following updates and improvements have been made to the policy list page:

  • When a single row is selected, display a menu with accompanying descriptive text below it. The More dropdown in this menu contains the same items as the right-click context menu.
  • When multiple rows are selected, the inline menu disappears and the top menu bar changes to display buttons applicable to multi-selection.
  • Update the top-right view options to a dropdown containing three options.
  • Add a tooltip to the view option to indicate that selecting By Sequence will result in the fastest loading time if the table size is greater than 10 thousand.
923611 Support using tags for dynamic addresses in security policies in NGFW policy mode, including EMS (normal and local EMS tags), FortiPolicy, FortiVoice, and FortiNAC.

These tags can be selected as the source or destination addresses in security policies. Once these tags are used in security policies, use the diagnose ips pme dynamic-address list command to show the addresses that are used in the policy.

SD-WAN

Feature ID Description
834861 Add route tags to static routes.

config router static
    edit <seq-num>
        set tag <id>
    next
end

Add password field to BGP neighbor group to be used for the neighbor range.

config router bgp
    config neighbor-group
        edit <name>
            set password <password>
        next
    end
end
892611 Improve the current SD-WAN neighbor plus route-map-out-preferable design to support the multi-PoP multi-hub large scale architecture. In cases where multiple PoPs containing multiple hubs exist, incoming and outgoing traffic to a spoke needs to be preferred over a primary PoP as long as a minimum number of SD-WAN members in the zone meets SLA. When the criteria is not met, then traffic will switch over to a secondary PoP.

The following options are added:

  • minimum-sla-meet-members setting in SD-WAN zone configurations
  • zone-mode setting in SD-WAN service configurations
  • service-id attribute in SD-WAN neighbor configurations
  • sla-stickness attribute in SD-WAN service configurations
  • Allow the neighbor-group to be configured under SD-WAN neighbor configurations
893314 The maximize bandwidth (load-balance) strategy used prior to FortiOS 7.4.1 is now known as the load balancing strategy. This strategy can be configured under the manual mode and the lowest cost (SLA) strategies.

  • When the load balancing strategy is configured under the manual mode strategy, SLA targets are not used.
  • When the load balancing strategy is configured under the lowest cost (SLA) strategy, SLA targets are used.
899827 Improve the client-side settings of the SD-WAN network bandwidth monitoring service to increase the flexibility of the speed tests, and to optimize the settings to produce more accurate measurements. The changes include:

  • Support UDP speed tests.
  • Support multiple TCP connections to the server instead of a single connection.
  • Measure the latency to speed test servers and select the server with the smallest latency to perform the test.
  • Support the auto mode speed test, which selects either UDP or TCP testing automatically based on the latency threshold.
900198 When a customer using SD-WAN with ADVPN has numerous IPv4 and IPv6 routes per spoke and there are many spokes in the topology, it is more suitable to deploy an IPv4- and IPv6-supported solution without a route reflector that involves an active dynamic BGP neighbor triggered by an ADVPN shortcut. This solution allows a spoke FortiGate to form a BGP neighbor with another spoke FortiGate only after the shortcut tunnel between them has been established. The spoke only learns routes from its BGP neighbors.

The following IPv4 and IPv6 BGP configuration settings are required:

  • The hub FortiGate should be configured with neighbor-group and neighbor-range/neighbor-range6.
  • Each spoke FortiGate should be configured with neighbor-group and neighbor-range/neighbor-range6 (like the hub), and more importantly, each spoke should be configured with set passive disable to ensure spokes are able to initiate dynamic BGP connections between each other.
  • The hub FortiGate should have route reflection disabled (by default) where each neighbor-group setting should have set route-reflector-client disable.
914659 Add support for the new SD-WAN Overlay-as-a-Service through a license displayed as SD-WAN Overlay as a Service on the FortiGuard page, whose status is updated accordingly. Each FortiGate used with the FortiCloud Overlay-as-a-Service portal must have this license applied to it.

Security Fabric

Feature ID Description
688217 Update FortiVoice Fabric connector:

  • Display FortiVoice endpoint details in the device tooltips (FortiView monitor and log pages). Users can view the display name and extension number of each FortiFone, making it easier to identify and manage endpoint phones.
  • When a FortiVoice-supplied MAC or IP address is used in a firewall policy, automatically create a FortiVoice tag (MAC/IP) dynamic address on the FortiGate that contains all the provisioned FortiFones registered with FortiVoice. The dynamic address can be used in firewall policies to restrict rules to authorized FortiFones only.
860248 Add CIS security control mappings to the Security Rating page. Users can view ratings by CIS compliance and view the description for each CIS control. The FortiGate must have a valid Attack Surface Security Rating license to view security ratings grouped by CIS.
875696 Add prompting for a one-time upgrade when a critical vulnerability is detected upon login. After logging in, the GUI displays a warning message about the critical vulnerability and allows the administrator to either upgrade or skip it. This ensures that the administrator is aware of any potential security risks and can take immediate action to address them.

Security Profiles

Feature ID Description
780874 OT virtual patching is a method for mitigating vulnerability exploits against OT devices by applying patches virtually on the FortiGate. In short, when a virtual patching profile is enabled on a firewall policy, the IPS engine will use the MAC address of the device to verify whether known vulnerabilities and mitigation rules are associated with it. If there is, then the IPS engine will apply mitigation rules to traffic for that device.
819093 The inline CASB security profile enables the FortiGate to perform granular control over SaaS applications directly on firewall policies. The supported controls include privilege control, safe search, tenant control, and UTM bypass. Administrators can also customize their own SaaS applications, matching conditions, and custom controls and actions. A firewall policy must use proxy-based inspection with a deep inspection SSL profile in order to apply inline CASB and scan the traffic payload.
869769 Display application signatures in a hierarchical manner when defining application overrides in the GUI.
915879 Add two FortiGuard web filter categories:

  • Artificial intelligence technology (category 100): sites that offer solutions, insights, and resources related to artificial intelligence (AI).
  • Cryptocurrency (category 101): sites that specialize in digital or virtual currencies that are secured by cryptography and operate on decentralized networks.
925363 The FortiGate can download quarantined files in an archive format (.TGZ) instead of the original raw file. This allows for a more detailed analysis of the quarantined files and reduces the risk of malware infection.

System

Feature ID Description
739200 Add GUI support to prevent FortiGates with an expired support contract from upgrading to a major or minor firmware release.
843997 Support Enrollment over Secure Transport (EST) and the RFC 7030 standards when generating a new CSR request, performing automatic renewals, or manually regenerating a certificate. EST provides more security for automatic certificate management than Simple Certificate Enrollment Protocol (SCEP), which is commonly used for certificate enrollment.

# execute vpn certificate local generate est <options>
905629 Introduce the Operational Technology (OT) Security Service to help consolidate OT services under one license and to decouple the underlying definitions and packages from IoT ones. New OT-related services such as OT Detection Definitions and OT Virtual Patching Signatures used in the virtual patching profile are now licensed under the OT Security Service.
909935 Include a built-in entropy token source, which eliminates the need for a physical USB entropy token when booting up in FIPS mode on any platform. This enhancement meets the requirements of FIPS 140-3 Certification by changing the source of entropy to jitter entropy, which is known for its reliability and security.
914674 Support log rotation for auto-script. Upon reaching its maximum size, the log file will seamlessly begin overwriting from the start, rather than halting the script.
927945 Introduce selected availability (SA) versioning and labeling for special builds provided for customers that will remain on the build for a long duration. The SA versioning uses an odd number as the minor version, and a four-digit number for the patch version.

User & Authentication

Feature ID Description
743804 Add a RADIUS option to allow the FortiGate to set the RADIUS accounting message group delimiter to a comma (,) instead of a plus sign (+) when using RSSO. The default delimiter is still a plus sign.
885400 Support local user password policies with enhanced complexity options. This allows customization of the local firewall user password policy with various settings, such as minimum length, character types, and password reuse. These settings are similar to the ones available for the system administrator password policy, which offers more security and flexibility than the previous local user password policy.

After upgrading, users must activate the user password policy using the CLI. The previous password policy settings will remain valid, but they will not be effective unless the password policy is enabled. If the password policy is not enabled, the expire-days <integer> option will not force users to change their password after number of specified days.

932769 Allow secure connections to SSL VPNs using certificate-based authentication. By utilizing the RADIUS protocol for authorization, access is granted based on the content of the Subject Alternative Name (SAN) in the user’s certificate. This adds an extra layer of security by ensuring that only users with valid certificates can access the VPN.

VPN

Feature ID Description
780297 Enhance IKE debug filtering:

  • Reorganize ike-log-filter and ike-gateway-filter into two separate sub-commands.
  • Rename the src-addr and dst-addr filter options to loc-addr and rem-addr to make the naming more precise.
  • Add option to show the name of current executing functions in the IKE debug log (diagnose vpn ike log function-name {enable | disable}).
  • Display VDOM name instead of VDOM index in the debug log to provide more readability.
881903 Adjust the DTLS heartbeat parameters for SSL VPN. This improves the success rate of establishing a DTLS tunnel in networks with congestion or jitter.

config vpn ssl settings
    set dtls-heartbeat-idle-timeout <integer>
    set dtls-heartbeat-interval <integer>
    set dtls-heartbeat-fail-count <integer>
end

The default value for these attributes is 3 seconds, which is also the minimum allowable value. The maximum allowable value for these attributes is 10 seconds.

884772 Securely exchange serial numbers between FortiGates connected with IPsec VPN. This feature is supported in IKEv2, IKEv1 main mode, and IKEv1 aggressive mode. The exchange is only performed with participating FortiGates that have enabled the exchange-fgt-device-id setting under config vpn ipsec phase1-interface.
909970 Support multiple interface monitoring for IPsec. This enables IPsec to monitor multiple interfaces per IPsec tunnels and activate the backup link only when all primary links are down. This is useful for customers who have more than one WAN link and want to minimize the use of their LTE or 5G interfaces, which are more costly and bandwidth-intensive. This allows customers to optimize their WAN link selection and performance, and reduce their operational expenses.

ZTNA

Feature ID Description
913238 Add four new categories and 14 subtypes of ZTNA replacement messages that correspond to new error codes error messages. Additional information is displayed for specific errors, and provides end users with more information about the error encountered.

Rozwiązane problemy:

Anti Spam

Bug ID Description
857718 Return Email DNS Check in the email filter profile is case sensitive.

Anti Virus

Bug ID Description
908706 On the Security Profiles > AntiVirus page, a VDOM administrator with a custom administrator profile cannot create or modify an antivirus profile belonging to the VDOM.

Data Leak Prevention

Bug ID Description
911291 The FortiGate does not parse the entries of the sensor from DLP signature package properly, and therefore cannot block files matching a sensor as expected.

Endpoint Control

Bug ID Description
808737 FortiOS should pull new avatar API from EMS and handle the avatar status on the FortiGate.

Explicit Proxy

Bug ID Description
817582 When there are many users authenticated by an explicit proxy policy, the Firewall Users widget can take a long time to load. This issue does not impact explicit proxy functionality.
859693 Session state is incorrectly shown as SYN_SENT when using an IP pool in explicit proxy policy.
890776 After upgrading a FWF-61F, get configuration error and the gui-explicit-proxy setting is lost.

Firewall

Bug ID Description
708229 ACL feature is incorrectly dropping fragmented UDP packets.
843554 If the first firewall service object in the service list (based on the order in the command line table) has a protocol type of IP, the GUI may incorrectly modify its protocol number whenever a new firewall service of the same protocol type IP is created in the GUI.

This silent misconfiguration can result in unexpected behavior of firewall policies that use the impacted service. For example, some 6K and 7K platforms have firewall service ALL (protocol type IP) as the first service, and this can cause the ALL service to be modified unexpectedly.

847715 A VIP group having members of the FQDN and static NAT VIP types cannot be created using the GUI (Policy & Objects > Virtual IPs page).
872312 Unable to add more MAC addresses once the MAC address group object for a VWP policy referenced.
895946 Access to some websites fails after upgrading to FortiOS 7.2.3 when the firewall policy is in flow-based inspection mode.
910068 On the Policy & Objects > Firewall Policy page, if any of the interface names contain a space, the page does not load when Interface Pair View is selected.
912740 On a FortiGate managed by FortiManager, after upgrading to 7.4.0, the Firewall Policy list may show separate sequence grouping for each policy because the global-label is updated to be unique for each policy.
917495 When editing a VLAN ID, the FortiGate deletes firewall policies but does not recreate them again if the interface is in a zone.
919418 On the Policy & Objects > Firewall Policy page, when the interface name used in a virtual wire pair is a substring of interfaces used in a firewall policy, such policies are not displayed. For example, if a virtual wire pair consists of interfaces port1 and port2, firewall policies with port10, port11, port21, port22 are not displayed.
929138 The Edit Address page does not load if the address name contains has special characters ([ ]).

FortiGate 6000 and 7000 platforms

Bug ID Description
888310 The FortiGate 6000 or 7000 front panel does not appear on the Network > Interfaces and System > HA GUI pages.
888447 In some cases, the FortiGate 7000F platform cannot correctly reassemble fragmented packets.
888873, 909160 The FortiGate 7000E and 7000F platforms do not support GTP and PFCP load balancing.
891430 The FortiGate 6000 and 7000 System Information dashboard widget incorrectly displays the management board or primary FIM serial number instead of the chassis serial number. Use get system status to view the chassis serial number.
897629 The FortiGate 6000 and 7000 platforms do not support EMAC VLANs.
899905 Adding a FortiAnalyzer to a FortiGate 6000 or 7000 Security Fabric configuration from the FortiOS GUI is not supported.
902545 Unable to select a management interface LAG to be the direct SLBC logging interface.
905692 On a FortiGate 6000 or 7000, the active worker count returned by the output of diagnose sys ha dump-by group can be incorrect after an FPC or FPM goes down.
905788 Unable to select a management interface LAG to be the FGSP session synchronization interface.
908576 On a FortiGate 7000F, after a new FPM becomes the primary FPM, IPsec VPN dynamic routes are not synchronized to the new primary FPM.
908674 Sessions for IPsec dialup tunnels that are configured to be handled by a specific FPC or FPM may be incorrectly sent to a different FPC or FPM, resulting in traffic being blocked.
913040 Multiple IP pools in SSL VPN is not supported.
918795 An uncertified warning appears only on the secondary chassis’ FIM02 and FPMs.
921452 After an SNMP HA failover, the SNMP trap continues to work.

FortiView

Bug ID Description
808384 Real-time FortiView Traffic Shaping monitor shows 0 bandwidth for active FTP traffic.

GUI

Bug ID Description
562570 System > FortiGuard page’s License Information table does not show the updated IPS engine version.
825598 A Node exiting due to unhandled rejection: TypeError [ERR_INVALID_URL]: Invalid URL error message appears in the debug crash log for the node process. This error does not impact the GUI operation.
857464 The CPU and Sessions widgets report the current numbers at the wrong places for most time periods.
863126 In an environment where the Security Fabric is enabled and there are more than 100 firewall object conflicts between the root and downstream FortiGates, the Firewall Object Synchronization pane does not list the details.
892364 Incorrect interface is being selected in the SD-WAN Rules GUI page, but the correct one is displayed in the CLI.
893560 When private data encryption is enabled, the GUI may become unresponsive and HA may fail to synchronize the configuration.
897004 On rare occasions, the GUI may display blank pages when the user navigates from one menu to another if there is a managed FortiSwitch present.
898386 Browser returns a blank page after logging in to the GUI with an IPv6 address.
898902 In the System > Administrators dialog, when there are a lot of VDOMs (over 200), the dialog can take more than one minute to load the Two-factor Authentication toggle. This issue does not affect configuring other settings in the dialog.
903856 When using configuration save mode with VDOMs, the GUI still shows unsaved changes after another administrator commits their changes with SSH.
905200 When logged in to the GUI of a non-management VDOM and trying to complete the Migrate Config with FortiConverter step in the startup menu, the page does not update and the loading spinner is stuck.
905795 Random FortiSwitch is shown as offline on the GUI when it is actually online.
914176 GUI should allow user to skip the Migration Config with FortiConverter step without having to wait for a server connection.
920881 Improve the policy list performance.

HA

Bug ID Description
703614 HA secondary synchronization fails and keeps rebooting when the primary has a split port configuration.
771316 Platforms in an HA environment get stuck in a reboot loop while attempting to synchronize configurations that differ in split ports.
818432 When private data encryption is enabled, all passwords present in the configuration fail to load and may cause HA failures.
858683 FortiGate in A-P HA mode with admin-restrict-local enabled allows the local administrator to log in to the passive host, even if LDAP is available.
908062 FortiGate VM Azure HA cluster goes out-of-sync due to dynamic firewall address type.
916903, 919982, 922867 When an HA management interface is configured, the GUI may not show the last interface entry in config system interface on several pages, such as the interface list, policy list, address list, and DNS servers page. This is a GUI-only display issue and does not impact the underlying operation of the affected interface.
920233 The System > HA page is missing from the GUI on 5K models.

Hyperscale

Bug ID Description
832924 Timeouts occur when accessing the Migros Bank e-banking application and https://www.gs***.ch/ when the session is offloaded.
915796 With an enabled hyperscale license, in some cases with exception traffic (like ICMP error traverse), the FortiGate may experience unexpected disruptions when handling the exception traffic.

Intrusion Prevention

Bug ID Description
810783 The number of IPS sessions is higher than kernel sessions, which causes the FortiGate to enter conserve mode.
823583 Failover on clustered web application using keepalived daemon does not work seamlessly.

IPsec VPN

Bug ID Description
664828 L2TP VPN not working when offloading is enabled.
780297 IKE debug log filtering functionality exhibits inaccuracies, resulting in the possibility of displaying unmatched logs when filters are set.
803010 The vpn-id-ipip encapsulated IPsec tunnel with npu-offload cannot be reached with IPv6.
883138 VM running FIPS cipher mode does not show AES-CBC ciphers when configuring IPsec in the GUI.
885333 Forwarded broadcast traffic on ADVPN shortcut tunnel interface dropped.
899822 IPsec dialup tunnel interface does not appear in the Interface dropdown of a Dashboard > Status > Interface Bandwidth widget.
923061 With ICMPv6 ff02::1, all nodes’ addresses experience incrementing IPsec TX errors.

Log & Report

Bug ID Description
831441 The forward traffic log show exabytes of data being sent and received from external to external IP addresses in multiple VDOMs.
839934 Destination interface in traffic log does not match the SD-WAN quality description in the log details.
860822 When viewing logs on the Log & Report > System Events page, filtering by domain\username does not display matching entries.
906888 Free-style filter not working as defined under config fortianalyzer override-filter.

Proxy

Bug ID Description
733258 Support HTTP3 for web proxy and ZTNA web service.
783549 An error condition occurs in WAD caused by multiple outstanding requests sent from client to server with UTM enabled.
820096 CPU usage issue in proxyd caused by the absence of TCP teardown.

REST API

Bug ID Description
886012 The MTU value on an interface cannot be set using the interface REST API.

Routing

Bug ID Description
775752 link-down-failover does not bring the BGP peering down.
849988 The Network > SD-WAN > SD-WAN Rules page does not show a red exclamation mark for addresses that have dst-negate enabled. This is cosmetic; users can use the CLI to confirm that the address has dst-negate enabled.
907386 BGP neighbor group configured with password is not working as expected.
924940 When there are a lot of policies (several thousands), the interface member selection for the SD-WAN Zone dialog may take up to a minute to load.

Security Fabric

Bug ID Description
862424 On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables), security rating reports may cause the FortiGate to go into conserve mode.
874822 In a configuration with a connected FortiAP-U, the FortiAP & FortiAP-S & FortiAP-W2 & FortiAP-U Command Injection in CLI security rating test fails and suggests an upgrade to 7.0.4, even though the FortiAP is on the latest version (7.0.0).
876422 After adding a 20 MB blocklist file, a FortiGate with 2 GB RAM goes to conserve mode when viewing the Security Fabric > External Connectors page.
907172 Automation stitch with FortiDeceptor Fabric connector event trigger cannot be triggered.

SSL VPN

Bug ID Description
719740 The No SSL-VPN policies exist warning is displayed when an SSL VPN zone having an SSL VPN tunnel interface is used in a policy. The warning can be ignored; it does not affect the SSL VPN functionality.
822657 Internal resource pages and menus are not showing correctly in web mode.
830068 SSL VPN stops listening on IPv6 interface after a reboot.
835014 Webpage keeps loading when customer accesses an internal webpage in the SSL VPN web portal.
843756 Customer bookmark (*.tr***.pt) is not accessible when using SSL VPN web mode.
845817 Jira application is not loading properly when connecting through SSL VPN web mode.
851976 PC cannot get IP from DHCP server due to find duplicate ip and causes the dialup SSL VPN to fail.
854607 In SSL VPN web mode, the page keeps loading after logging in.
859275 Issues with accessing an internal site using SSL VPN web mode and bookmark.
881268 Disconnecting from SSL VPN using the SSL-VPN widget does not disconnect the SSL VPN tunnel.
922446 SSL VPN service over PPPoE interface does not work as expected if the PPPoE interface is configured with config system pppoe-interface.

config system pppoe-interface
    edit <name>
        set device <string> 
        set username <string>
        set password <password>
    next
end

config vpn ssl settings
    set source-interface <PPPoE_interface_name>
end

This issue is also observed on VNE tunnel configurations.

Switch Controller

Bug ID Description
848632 Upon upgrade, the link to FortiSwitch stays down with QSFP.
861227 On the WiFi & Switch Controller > FortiSwitch Ports page, the Device Information column lists the same device multiple times.
902338 WiFi & Switch Controller > FortiSwitch Ports page does not show VLANs exported to another tenant VDOM, which results in the VLAN being removed if saved from the GUI.
904640 When a FortiSwitch port is reconfigured, the FortiGate may incorrectly retain old detected device data from the port that results in an unexpected number of detected device MACs for the port. Using diagnose switch-controller mac-cache show to check the device data can result in the Device Information column being blank on the WiFi & Switch Controller > FortiSwitch Ports page or in the Assets widget.
911232 Security rating shows an incorrect warning for unregistered FortiSwitches on the WiFi & Switch Controller > Managed FortiSwitches.

System

Bug ID Description
708964 CPU usage issue is observed caused by reloading the system when the system has cfg-save set to revert.
713951 Not all ports are coming up after an LAG bounce on 8 × 10 GB LAG with ASR9K. Affected platforms: FG-3960E and FG-3980E.
724085 Traffic passing through an EMAC VLAN interface when the parent interface is in another VDOM is blocked if NP7 offloading is enabled.
766834 High memory usage caused by downloading a large CRL list.
801481 Download speed issue through WAN configured with PPPoE on FortiGate.
802932 CPU usage issue caused by clearing BGP dampened prefixes.
816579 User loses GUI/SSH access on FG-1500D while running one-arm sniffer.
820559 When backing up the configuration to a USB disk, if the file name is the same as specified under System > Settings > Start Up Settings > USB auto-install, an Invalid file name error is displayed.
828557 FortiGate as DHCP relay is not showing a DHCP decline in the debugs when there is an IP conflict in the network.
836748 FG-100F fails to boot when FortiOS image binary is larger than 94 MB.
855573 False alarm of the PSU2 occurs with only one installed.
873391 If the FortiGate is added to FortiManager using the IPv6 address and tunnel is down for some reason, the FortiGate will not reconnect to FortiManager since fmg under system central-management is not set properly.
882187 FortiGate enters conserve mode in a few hours after enabling UTM on the policies.
884023 When a user is logged in as a VDOM administrator with restricted access and tries to upload a certificate (System > Certificates), the Create button on the Create Certificate pane is greyed out.
887940 Status light is not showing on the FortiGate 60F or 100F after a cold reboot.
900670 QSFP/QSFP+ port23/port24 are down after upgrading to 7.0.11 on FG-3401E.
904486 False alarm message, fos_ima: fos_process_appraise 99: Suspicous Executable File(/data/bin/node) is missing hash, might be shown and then forces the FortiGate to reboot.
909345 An error condition occurs caused by receiving ICMP redirect messages.
910651 On FG-600F, all members are up but the LACP status is showing as down after upgrading.
923364 System goes into halt state with Error: Package validation failed... message in cases where there are no engine files in the FortiGate when the BIOS security level is set to 2.
923834 The DSL modem on the firewall does not work after the device starts.
925657 After a manual system administrator password change, the updated password-expire is not received by the FortiManager auto-update.
933277 The npu-vdom-link cannot forward the traffic after the first two packets.
944581 Checksum on FortiOS is different from md5sum.txt file on the InfoSite when upgrading from previous GA build.

User & Authentication

Bug ID Description
738846 FAS ends up in an endless loop while synching with LDAP due to special character (,) as part of the username.
868481 When the Guest User Print Template is customized in a VDOM, printing the guest user credentials from User & Authentication > Guest Management still uses the default Guest User Print Template.
891068 Guest administration management does not show all groups for multiple VDOMs assigned to a guest administrator account.
896739 SSO administrator configuration breaks with Azure Cloud due to config system saml having a trailing slash in the metadata link.
915192 Device detection sometimes does not identify the correct IP addresses of devices.
922133 Unable to view authorization page on FortiGate pop-up when the pre-login and post-login banner are set on FortiGate while using OAuth authorization.
923164 EAP proxy daemon may keep reloading after updating the certificate bundle.
929112 RADUIS server dialog in the GUI incorrectly changes the custom RADUIS port to 0.

VM

Bug ID Description
902816 An error condition occurs after a failover on the HA cluster deployed on an FG-VM64-AZURE.
912184 An error condition is observed after deploying an FG-VM64-AZURE in Standard_DS4_v2 size.
924689 FortiGate VMs in an HA cluster deployed on the Hyper-V platform may get into an unresponsive state where multiple services are impacted: GUI management, CLI commands, SSL VPN sessions, DHCP assignment, traffic throughput, and reboot function.

Web Filter

Bug ID Description
873086 On the Policy & Objects > Security Policy page for a policy-based VDOM, adding an external threat feed category to the URL Category field does not apply the changes.
885222 HTTP session is logged as HTTPS in web filter when VIP is used.

WiFi Controller

Bug ID Description
873273 The Automatically connect to nearest saved network option does not work as expected when FWF-60E client-mode local radio loses connection.
877609 RADIUS COA does not work in some cases.
896128 Some 5 GHz weather channels should not be allowed in certain countries.
904349 Unable to create FortiAP profile in the GUI for dual-5G mode FortiAP U231F/U431F models.
905406 In auth-logon and auth-logout logs, Wi-Fi users with random public IP addresses are observed.
921456 FAP-431F is deauthenticating clients after roaming when DHCP enforcement is enabled on the SSID, even when the client gets IP from DHCP.
930130 MPSK keys are not loaded completely in the wpad daemon after applying a VAP with an MPSK profile selected on a FortiAP.
938525 Roaming is not working on FAP-431Fs for WPA2 enterprise bridge SSID with FortiNAC.

ZTNA

Bug ID Description
828433 FortiAuthenticator Cloud zero trust tunnel (ZTNA connection) fails when EMS Fabric connector is configured.

Należy pamiętać, że producent stale pracuje nad rozwiązywaniem tych problemów i udostępnia łatki oraz poprawki w kolejnych wersjach oprogramowania. Zaleca się skonsultowanie z dokumentacją producenta lub wsparciem technicznym Fortinet w celu uzyskania najbardziej aktualnych informacji i rozwiązań dla znanych problemów w FortiOS 7.4.1.

Notatki producenta: FortiOS 7.4.1

Pozdrawiamy,

Zespół B&B
Bezpieczeństwo w biznesie

Post Views: 1 462

Fortinet FortiOS FortiOS 7.4.1

Poprzedni artykułFortiAuthenticator 6.4.8Następny artykuł FortiManager 7.4.1

Najnowsze

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kategorie

  • Acronis
  • Aktualności
  • Bez kategorii
  • ESET
  • F-Secure
  • FortiAnalyzer
  • FortiAP
  • FortiAuthenticator
  • FortiClient
  • FortiDeceptor
  • FORTIGATE
  • FORTIMAIL
  • FortiManager
  • FortiNAC
  • FortiSIEM
  • FORTISWITCH
  • FortiWeb
  • NAKIVO
  • Proget
  • Qnap
  • Stormshield
  • Szkolenia
  • Veeam
  • VMware
  • WithSecure

Tagi

6.0.6 6.2.2 6.2.7 6.4.0 6.4.4 6.4.5 6.4.8 7.0.0 7.0.2 7.0.5 7.2.0 7.2.2 ems Eset eset endpoint antivirus eset endpoint security ESET Inspect ESET Protect ESET Protect Cloud F-Secure FMG FortiAnalyzer forti analyzer FortiAP fortiap-w2 FortiAuthenticator FortiClient FortiClientEMS forticlient ems FortiGate FortiMail FortiManager FortiNAC Fortinet FortiOS FortiSIEM FortiSwitch FortiWeb vCenter vCenter Server VMware VMware ESXi vmware esxi 8.0 vmware vcenter VMware vCenter Server

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

KONTAKT

biuro@b-and-b.plhttps://www.b-and-b.pl
8:00-16:00
RODO | POLITYKA PRYWATNOŚCI
OGÓLNE WARUNKI REKLAMACJI

BEZPIECZEŃSTWO W BIZNESIE 2025 - wszystkie prawa zastrzeżone

MENU

  • Start
  • O nas
  • Produkty
  • Usługi
    • Szkolenia
    • Cyberbezpieczny Samorząd
    • Audyt bezpieczeństwa informacji
      • Testy penetracyjne
      • Testy ataków socjotechnicznych
    • Audyt konfiguracji Fortigate
    • Prezentacje
    • Wdrożenia
  • Blog techniczny
  • Pomoc
  • Kariera
  • Kontakt

BLOG TECHNICZNY

FortiAnalyzer 7.6.38 maja 2025
FortiManager 7.6.330 kwietnia 2025
FortiMail 7.6.322 kwietnia 2025

Kontakt

+48 500-413-313
biuro@b-and-b.pl
8:00-16:00
Add new entry logo

Korzystamy z plików cookies lub podobnych technologii, by lepiej dopasować treści na stronie do Twoich potrzeb. W każdej chwili możesz zmienić ustawienia cookies. Polityka prywatności

Akceptuję Odmów
Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages.
  • Always Active
    Necessary
    Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

  • Marketing
    Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

  • Analytics
    Analytics cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

  • Preferences
    Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in.

  • Unclassified
    Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies.