Fortios v5.6.1 Release Notes
Fortios v5.6.1 Release Notes
Fortios v5.6.1 Release Notes
VERSION5.6.1
FORTINET DOCUMENTLIBRARY
http://docs.fortinet.com
FORTINETVIDEOGUIDE
http://video.fortinet.com
FORTINETBLOG
https://blog.fortinet.com
CUSTOMERSERVICE&SUPPORT
https://support.fortinet.com
FORTIGATECOOKBOOK
http://cookbook.fortinet.com
FORTINETTRAININGSERVICES
http://www.fortinet.com/training
FORTIGUARDCENTER
http://www.fortiguard.com
FEEDBACK
Email: [email protected]
01-561-442374-20170727
TABLEOFCONTENTS
Change Log 4
Introduction 5
Supported models 5
Whats new in FortiOS 5.6.1 6
Special Notices 7
Built-In Certificate 7
FortiGate and FortiWiFi-92D Hardware Limitation 7
FG-900D and FG-1000D 7
FortiClient (Mac OS X) SSL VPN Requirements 8
FortiGate-VM 5.6 for VMware ESXi 8
FortiClient Profile Changes 8
Use of dedicated management interfaces (mgmt1 and mgmt2) 8
Upgrade Information 9
Upgrading to FortiOS 5.6.1 9
Security Fabric Upgrade 9
FortiClient Profiles 9
FortiGate-VM 5.6 for VMware ESXi 10
Downgrading to previous firmware versions 10
Amazon AWS Enhanced Networking Compatibility Issue 10
FortiGate VM firmware 11
Firmware image checksums 12
Product Integration and Support 13
FortiOS 5.6.1 support 13
Language support 15
SSL VPN support 16
SSL VPN standalone client 16
SSL VPN web mode 16
SSL VPN host compatibility list 17
Resolved Issues 19
Known Issues 31
Limitations 36
Citrix XenServer limitations 36
Open Source XenServer limitations 36
Change Log
Release Notes 4
Fortinet, Inc.
Introduction
This document provides the following information for FortiOS 5.6.1 build 1484:
l Special Notices
l Upgrade Information
l Product Integration and Support
l Resolved Issues
l Known Issues
l Limitations
For FortiOS documentation, see the Fortinet Document Library.
Supported models
FortiOS Carrier FortiOS Carrier 5.6.1 images are delivered upon request and are not available on the
customer support firmware download page.
5 Release Notes
Fortinet, Inc.
Whats new in FortiOS 5.6.1 Introduction
For a list of new features and enhancements that have been made in FortiOS 5.6.1, see the Whats New for
FortiOS 5.6.1 document.
Release Notes 6
Fortinet, Inc.
Special Notices
Built-In Certificate
FortiGate and FortiWiFi D-series and above have a built in Fortinet_Factory certificate that uses a 2048-bit
certificate with the 14 DH group.
FortiOS 5.4.0 reported an issue with the FG-92D model in the Special Notices > FG-92D High Availability in
Interface Mode section of the release notes. Those issues, which were related to the use of port 1 through 14,
include:
l ARP (0x0806), IPv4 (0x0800), and VLAN (0x8100) packets are allowed
l BPDUs are dropped and therefore no STP loop results
l PPPoE packets are dropped
l IPv6 packets are dropped
l FortiSwitch devices are not discovered
l HA may fail to form depending the network topology
l All packet types are allowed, but depending on the network topology, an STP loop may result
CAPWAP traffic will not offload if the ingress and egress traffic ports are on different NP6 chips. It will only offload
if both ingress and egress ports belong to the same NP6 chip.
7 Release Notes
Fortinet, Inc.
FortiClient (Mac OS X) SSL VPN Requirements Special Notices
When using SSL VPN on Mac OS X 10.8, you must enable SSLv3 in FortiOS.
Upon upgrading to FortiOS5.6.1, FortiGate-VM v5.6 for VMware ESXi (all models) no longer supports the
VMXNET2 vNIC driver.
With introduction of the Security Fabric, FortiClient profiles will be updated on FortiGate. FortiClient profiles and
FortiGate are now primarily used for Endpoint Compliance, and FortiClient Enterprise Management Server (EMS)
is now used for FortiClient deployment and provisioning.
The FortiClient profile on FortiGate is for FortiClient features related to compliance, such as Antivirus, Web
Filter, Vulnerability Scan, and Application Firewall. You may set the Non-Compliance Action setting to Block or
Warn. FortiClient users can change their features locally to meet the FortiGate compliance criteria. You can also
use FortiClient EMS to centrally provision endpoints. The EMS also includes support for additional features, such
as VPN tunnels or other advanced options. For more information, see the FortiOS Handbook Security Profiles.
For optimum stability, use management ports (mgmt1 and mgmt2) for management traffic only. Do not use
management ports for general user traffic.
Release Notes 8
Fortinet, Inc.
Upgrade Information
FortiOS version 5.6.1 officially supports upgrading from version 5.4.4, 5.4.5, and 5.6.0. To upgrade from other
versions, see Supported Upgrade Paths.
Before upgrading, ensure that port 4433 is not used for admin-port or admin-
sport (in config system global), or for SSL VPN (in config vpn ssl
settings).
If you are using port 4433, you must change admin-port, admin-sport, or the
SSL VPN port to another port number before upgrading.
FortiOS 5.6.1 greatly increases the interoperability between other Fortinet products. This includes:
l FortiAnalyzer 5.6.0
l FortiClient 5.6.0
l FortiClient EMS 1.2.1
l FortiAP 5.4.2 and later
l FortiSwitch 3.5.2 and later
Upgrade the firmware of each product in the correct order. This maintains network connectivity without the need
to use manual steps.
Before upgrading any product, you must read the FortiOS Security Fabric Upgrade Guide.
FortiClient Profiles
After upgrading from FortiOS 5.4.0 to 5.4.1 and later, your FortiClient profiles will be changed to remove a
number of options that are no longer supported. After upgrading, review your FortiClient profiles to make sure
they are configured appropriately for your requirements and either modify them if required or create new ones.
The following FortiClient Profile features are no longer supported by FortiOS 5.4.1 and later:
9 Release Notes
Fortinet, Inc.
FortiGate-VM 5.6 for VMware ESXi Upgrade Information
It is recommended that you use FortiClient Enterprise Management Server (EMS) for
detailed Endpoint deployment and provisioning.
Upon upgrading to FortiOS5.6.1, FortiGate-VM v5.6 for VMware ESXi (all models) no longer supports the
VMXNET2 vNIC driver.
Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings
are retained:
l operation mode
l interface IP/management IP
l static route table
l DNS settings
l VDOM parameters/settings
l admin user account
l session helpers
l system access profiles.
If you have long VDOM names, you must shorten the long VDOM names (maximum 11 characters) before
downgrading:
Release Notes 10
Fortinet, Inc.
Upgrade Information FortiGate VM firmware
When downgrading from 5.6.1 to older versions, running the enhanced nic driver is not allowed. The following
AWS instances are affected:
l C3
l C4
l R3
l I2
l M4
l D2
FortiGate VM firmware
Fortinet provides FortiGate VM firmware images for the following virtual environments:
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.OpenXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains the QCOW2 file for Open Source XenServer.
l .out.CitrixXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.
Linux KVM
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.kvm.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
QCOW2 that can be used by qemu.
Microsoft Hyper-V
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.hyperv.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains three folders that can be imported by Hyper-V Manager on Hyper-V 2012. It also contains the file
fortios.vhd in the Virtual Hard Disks folder that can be manually added to the Hyper-V Manager.
l .out: Download either the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .ovf.zip: Download either the 64-bit package for a new FortiGate VM installation. This package contains
Open Virtualization Format (OVF) files for VMware and two Virtual Machine Disk Format (VMDK) files used by
the OVF file during deployment.
11 Release Notes
Fortinet, Inc.
Firmware image checksums Upgrade Information
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service &
Support portal, https://support.fortinet.com. After logging in select Download > Firmware Image Checksums,
enter the image file name including the extension, and select Get Checksum Code.
Release Notes 12
Fortinet, Inc.
Product Integration and Support
The following table lists 5.6.1 product integration and support information:
13 Release Notes
Fortinet, Inc.
FortiOS 5.6.1 support Product Integration and Support
Fortinet Single Sign-On l 5.0 build 0254 and later (needed for FSSO agent support OU in
(FSSO) group filters)
l Windows Server 2016 Datacenter
l Windows Server 2016 Standard
l Windows Server 2008 (32-bit and 64-bit)
l Windows Server 2008 R2 64-bit
l Windows Server 2012 Standard
l Windows Server 2012 R2 Standard
l Novell eDirectory 8.8
FSSO does not currently support IPv6.
AV Engine l 5.247
Virtualization Environments
Release Notes 14
Fortinet, Inc.
Product Integration and Support Language support
FortiGate-VM v5.6 for VMware ESXi (all models) no longer supports the VMXNET2
vNIC driver.
Language support
Language support
Language GUI
English
Chinese (Simplified)
Chinese (Traditional)
French
Japanese
Korean
Portuguese (Brazil)
Spanish (Spain)
15 Release Notes
Fortinet, Inc.
SSL VPN support Product Integration and Support
Linux CentOS 6.5 / 7 (32-bit & 64-bit) 2333. Download from the Fortinet Developer
Network https://fndn.fortinet.net.
Linux Ubuntu 16.04
Other operating systems may function correctly, but are not supported by Fortinet.
SSL VPN standalone client no longer supports the following operating systems:
Microsoft Windows 7 SP1 (32-bit & 64-bit) Microsoft Internet Explorer version 11
Release Notes 16
Fortinet, Inc.
Product Integration and Support SSL VPN support
Mozilla Firefox
Google Chrome
Google Chrome
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
17 Release Notes
Fortinet, Inc.
SSL VPN support Product Integration and Support
Release Notes 18
Fortinet, Inc.
Resolved Issues
The following issues have been fixed in version 5.6.1. For inquires about a particular bug, please contact
Customer Service & Support.
Antivirus
Bug ID Description
374969 FortiSandbox FortiView may not correctly parse the FSA v2.21 tracer file (.json).
411432 scanunitd causes high CPU usage when making configuration changes.
Authentication
Bug ID Description
402621 Radius Accounting Packet Calling-Station-ID field should return MAC address instead of
IP address.
416618 LDAP does not work when number of matching entries is even in user group.
437204 authd sends malformed NTLM TYPE2 to browser and breaks NTLM authentication.
438972 Nested Groups in LDAP authentication does not work when the Domain users in AD is not
the Primary Group.
DLP
Bug ID Description
367514 Executable files may not be blocked by DLP built-in .exe file-type filter.
422355 DLP file-type filter cannot detect .mov file during file upload.
19 Release Notes
Fortinet, Inc.
Resolved Issues
DNSFilter
Bug ID Description
414243 DNSFilter local FortiGuard SDNS servers failed to respond due to malformed packet.
422407 dnsproxy causes high CPU usage and degradation of DNS traffic.
FOC
Bug ID Description
412883 Over-subscription of TP2 XAUI when running GTP in LAG with FG3700DX platform.
FortiGate 92D
Bug ID Description
FortiLink
Bug ID Description
FortiView
Bug ID Description
378576 The All Sessions > filter application on historical view does not work and suggests adding
filter for destination port.
390495 Unable to view web sites in FortiView for 5 minutes, 1 hour, and 24 hours.
Firewall
Bug ID Description
305575 In the Policy List, the NAT column can give more useful information.
416111 FQDN address is unresolved in a VDOM, although the URL is resolved with IP.
Release Notes 20
Fortinet, Inc.
Resolved Issues
Bug ID Description
435070 Full Cone NAT not working for WhatsApp video and voice call.
435095 FortiOS ICMP replies or error messages are dropped when asymmetric routing is involved.
435700 RSTP session-helper does not modify the IP in describe payload when the server IP is a VIP.
GUI
Bug ID Description
310497 Improve GUI error message when trying to create a VLAN interface and physical interface
is not selected.
368069 Cannot select wan-load-balance or members for incoming interface of IPsec tunnel.
373546 Only 50 security logs may be displayed in the Log Details pane when more than 50 are
triggered.
373602 Cannot access System > Advanced from the GUI - page keep loading.
374373 Policy View: Filter bar may display the IPv4 policy name for the IPv6 policy.
388104 Interface list expand column display improperly in VLAN interface in a Zone.
394359 REST API firewall policy lookup does not work properly.
397010 GUI does not display the App-DB and INDUSTRIAL-DB information.
398394 Log viewer, negative filter for severity Information field cannot be done manually.
408577 Admin and FortiClient profile cannot be displayed when language is Japanese.
413891 In Topology > FortiAnalyzer, clicking Configure setting redirects to VDOM security fabric
page.
21 Release Notes
Fortinet, Inc.
Resolved Issues
Bug ID Description
413921 In FSSO standard mode, context menu allows you to delete ad-groups polled from CA.
415326 CLI configuration for address object allows IP range 0.0.0.0-x.x.x.x, but not in GUI.
421263 Multiple wildcard login accounts gives wrong guest account provisioning when Post-
login-banner is enabled.
423410 Zone interface shows as down in the IPv4 Policy page even when its member is up.
441350 Trying to access the root FortiGate Security Fabric dashboard produces Error 404.
HA
Bug ID Description
404089 Uninterruptible upgrade fails because routes are not yet synced with new master.
416673 The System >HA pane is not in the GUI. HAis supported and can be configured in the CLI.
421639 HA kernel routes are not flushed after failover when cluster has a large number of routes.
434800 SNMP trap does not reach SNMP server via HA Master when hbdev interface is up.
IPS
Bug ID Description
Release Notes 22
Fortinet, Inc.
Resolved Issues
Bug ID Description
434592 Ethernet.IP is not recognized in ICS app ctrl signature by sniffer mode.
IPsec
Bug ID Description
401847 Half of IPsec tunnels traffic lost 26 minutes after powering on a spare FG-1500D.
412863 NP6 drops fragment packet with payload 15319 bytes or higher.
412987 IPsec VPN certificate not validated against PKI users CN and Subject.
414899 Apple Cisco IPsec VPN group name (IKE ID) length limit.
415353 Telnet connection timing out with IPsec through MPLS when offloading is enabled.
435124 Cannot establish IPsec phase1 tunnel after upgrading from version 5.4.5 to 5.6.0.
Workaround: After upgrading to 5.6.0, reconfigure all IPsec phase1 psksecret settings.
Bug ID Description
386668 FortiGate sends FortiAnalyzer different time stamps from its disk log.
396319 For the NGFW_vdom, the application UTM log action is always PASS when firewall policy
deny the traffic.
413778 With long VDOM names, no log is displayed when only one field subtype forward is added to
traffic log filter.
23 Release Notes
Fortinet, Inc.
Resolved Issues
Proxy
Bug ID Description
418193 Some HTTPS sites show Secure Connection Failed (static URL filter only flow-based
webfilter, certificate inspection).
Router
Bug ID Description
412336 Specific static route on vwl member interface should not be controlled by vwl status.
415366 WAN LLB with IP pools configured for two ISP connections.
Security Fabric
Bug ID Description
385341 If there are multiple FortiAPs managed, GUI cannot display managed FortiAPs in FortiView
> Physical Topology page.
403085 The session tab cannot be displayed on historical page when you drill down.
408495 An improper warning message may appear in the FortiAnalyzer log when changing the root
FortiGate to a downstream FortiGate.
411479 The icon used to signify the source of logs when the time range is set to now is incorrect.
411645 Drilling down from a root FortiGate to a downstream FortiGate causes an error.
412104 The drill down for an aggregated device is not displayed as an individual device.
Release Notes 24
Fortinet, Inc.
Resolved Issues
Bug ID Description
412930 The Security Audit Event is not hidden on Security Fabric child nodes.
413189 The bubble chart with FortiAnalyzer view may not be drawn correctly.
413492 Security Fabric topology change can cause high CPU usage by miglogd on Security Fabric
root.
413742 In Security Fabric topology, the red circle to indicate the root node of the Security Fabric
should not be displayed on each child FortiGate.
413912 In Security Fabric topology, the upstream FortiGate can still be displayed when Security
Fabric is disabled on a downstream FortiGate.
414147 In Security Fabric topology, the topology cannot be updated after changing the upstream
port on a child FortiGate.
414301 Security Fabric topology is not displayed due to js error Cannot read property
'VDOM' of undefined.
SLBC
Bug ID Description
378207 authd process causes high CPU usage when only RSSO logging is configured.
Spam
Bug ID Description
408971 Management Traffic is sent out via wrong interface in Virtual WAN Link.
410420 Spam emails are exempted if they are sent in one session.
416790 (no.x pattern matched) is not logged when bwl matches envelop MAIL FROM.
424443 Client behind FG-60E cannot get bounced mail when sending a spam mail to Hotmail
/Outlook.
SSL VPN
Bug ID Description
304528 SSL VPN Web Mode PKI user might immediately log back in even after logging out.
25 Release Notes
Fortinet, Inc.
Resolved Issues
Bug ID Description
380974 Possible root cause of SSL VPN fail with error:0B080074: ..X509_check_
private_key:key values mismatch/ApacheSSLSetCertStuff.
396788 SSL VPN GUI is unable to keep SSO password information for user bookmark.
406028 Citrix with Xenapp 7.x not working via SSL VPN web portal.
408624 SSL VPN certificate UPN+LDAP authentication works only on first policy.
413758 Auto-generated SSL interface do not associate with SSLVPN_TUNNEL_ADDR1 for a long
name VDOM.
414074 Application with Jira 7.2 and higher does not display properly in SSL VPN web mode.
415543 Request ability to exclude certain services from being created via personal bookmark.
415746 SSO on SSL VPN HTTP bookmark uses OTP instead of password in Auth HTTP header field
when user authenticates via TFA.
423415 Incorrectly resolved membership for group members using SSL VPN.
424561 SSL VPN web mode has trouble loading certain page in HTTP/HTTPS bookmark.
438004 A bookmark having access link to a web page does not work via SSL VPN web mode.
System
Bug ID Description
410463 SNMP is not responding when queried on a loopback IP address with an asymmetric SNMP
packet path.
412184 If you use port 4433 for the admin-port, admin-sport, you cannot access GUI
anymore.
Release Notes 26
Fortinet, Inc.
Resolved Issues
Bug ID Description
413909, The diagnose hardware test system cpu, diagnose hardware test cpu model, and
404337 diagnose hardware test bios fail to produce a correct hardware report.
Affected models: FortiGate / FortiWiFi 30E, 50E, 51E, 52E, 60E, 61E, 80E, 81E, 100E,
100EF, 101E, and 140E series.
414482 The pre-allocated size for interface cache and policy cache is not big enough.
417644 When remote wildcard admin with Radius accprofile-override is enabled (super
admin), restoring config fails on slave.
420150 NTPv3 with authentication enabled fails with error receive: authentication
failed.
421813 With VDOM enabled, after restoring a VDOM, the members of a zone are removed.
423039 After the upgrade from 5.4.4 to 5.6.0, FortiGate cannot receive public IP with Netgear
Aircard 341U.
424213 Cluster virtual MAC address is changed to physical port MAC address when ports are
assigned on MGMT-VDOM.
27 Release Notes
Fortinet, Inc.
Resolved Issues
Bug ID Description
438944 BPDU frames are not changed in TP mode when one arm is connected to multiple VLANs.
440041 DHCPv6 seems to fail when ip6-mode is DHCP failed to assign link-local address.
User
Bug ID Description
410901 PKI peer CA search stops on first match based on CA subject name.
421456 FortiGate cannot authenticate with Cisco ISE Radius and token.
434849 Guest User Email Template cut off when emailed to the recipient.
439760 User name is not visible in logs and on blocking page when using explicit proxy and Kerberos
authentication.
VM
Bug ID Description
416783 FortiGate Image for ESXi loses interface information when reboot-upon-config-
restore is disabled and a config is restored.
VoIP
Bug ID Description
423437 SIP ALG does not translate all MSRP SEND messages if more than one SEND message is
contained within a single packet.
Release Notes 28
Fortinet, Inc.
Resolved Issues
WebProxy
Bug ID Description
398405 WAD crashes without backtrace - WAF HTTP header matching problem.
438759 TeamViewer not blocked with explicit proxy application control with SSL deep inspection.
WiFi
Bug ID Description
413693 WPA_Entreprise with Radius Auth mode fails with VDOM that has a long VDOM name.
417001 Explicit HTTP proxy drops HTTPS connections on WiFi rating failures.
420967 Proxy AV + Proxy WF + SSL Certificate Inspection (Inspect All Ports) results in HTTPS traffic
bypassing WiFi.
436354 Replace Message Group Web Filter Block Override page not working.
438003 Part of APs failed to be managed by FortiGate because cw_acd crashed in CMCC portal
authentication.
29 Release Notes
Fortinet, Inc.
Resolved Issues
FortiOS5.6.1 is no longer vulnerable to the following issues and CVE references. For more information, see
https://fortiguard.com/psirt.
Bug ID Description
409913 l 2017-3130
414418 l 2017-3131
l 2017-3132
l 2017-3133
416322 l 2017-2636
416914 l 2016-10229
421539 l 2009-3555
422133 l 2009-3555
440744 FortiOS: Reflected XSS in Web Proxy Disclaimer Response web page due proxy URL has
not been sanitized.
Release Notes 30
Fortinet, Inc.
Known Issues
The following issues have been identified in version 5.6.1. For inquires about a particular bug or to report a bug,
please contact Customer Service & Support.
Application Control
Bug ID Description
435951 Traffic keeps going through the DENY NGFW policy configured with URL category.
Firewall
Bug ID Description
FortiGate 3815D
Bug ID Description
FortiLink
Bug ID Description
434470 Explicit policy for traffic originating from interface dedicated to FortiLink.
441300 Limited options in FortiLink quarantine stanza to use, giving users no way to trigger the
quarantine function.
FortiSwitch-Controller/FortiLink
Bug ID Description
304199 Using HA with FortiLink can encounter traffic loss during failover.
369099 FortiSwitch authorizes successfully, but fails to pass traffic until you reboot FortiSwitch.
31 Release Notes
Fortinet, Inc.
Known Issues
Bug ID Description
408082 Operating a dedicated hardware switch into FortiLink changes STP from enable to disable.
415380 DHCP snooping enabled on FortiSwitch VLAN interfaces may prevent clients from obtaining
addresses through DHCP.
Workaround: disable switch-controller-dhcp-snooping on FortiLink VLAN
interfaces.
FortiView
Bug ID Description
366627 FortiView Cloud Application may display the incorrect drill down File and Session list in the
Applications View.
375172 FortiGate under a FortiSwitch may be shown directly connected to an upstream FortiGate.
402507 In physical/logical topology, threat drill down fails and keeps GUI loading unexpectedly.
408100 Log fields are not aligned with columns after drill down on FortiView and Log details.
441835 Drill down a auth-failed wifi client entry in "Failed Authentication" could not display detail
logs when CSF enabled
442238 FortiView VPN map cant display Google map (199 dialup VPN tunnel).
442367 In FortiView > Cloud Applications, when the cloud users column is empty, drill down will
not load.
GUI
Bug ID Description
374247 GUI list may list another VDOM interface when editing a redundant interface.
375036 The Archived Data in the Sniffer Traffic log may not display detailed content and download.
375383 If the policy includes the wan-load-balance interface, the policy list page may receive a
javascript error when clicking the search box.
398397 Slowness in accessing Policy and Address page in GUI after upgrading from 5.2.2 to 5.4.1.
402775 Add multiple ports and port range support in the explicit FTP/web proxy.
Release Notes 32
Fortinet, Inc.
Known Issues
Bug ID Description
403146 Slow GUI Policy tab with more than 600 policies.
439185 AV quarantine cannot be viewed and downloaded from detail panel when source is
FortiAnalyzer.
442231 Link cannot show different colors based on link usage legend in logical topology real time
view.
HA
Bug ID Description
441078 The time duration of packet-transporting process stops to pre-master node after HA failover
takes too long.
IPsec
Bug ID Description
416102 Traffic over IPsec VPN gets dropped after two pings when it is getting offloaded to NPU.
Bug ID Description
412649 In NGFW Policy mode, FGT does not create webfilter logs.
438858 Synchronized log destination with Log View and FortiView display source.
Proxy
Bug ID Description
442252 WAD stops forwarding traffic on both transparent proxy and explicit web proxy after IPS test
over web proxy.
33 Release Notes
Fortinet, Inc.
Known Issues
Security Fabric
Bug ID Description
403229 In FortiView display from FortiAnalyzer, the upstream FortiGate cannot drill down to final
level for downstream traffic.
409156 In Security Fabric Audit, The unlicensed FDS FortiGate shouldn't be marked Passed in
Firmware & Subscriptions.
411368 In FortiView with FortiAnalyzer, the combined MAC address is displayed in the Device field.
414013 Log Settings shows Internal CLI error when enabling historical FortiView at the
same time as disk logging.
SSL VPN
Bug ID Description
System
Bug ID Description
364280 User cannot use ssh-dss algorithm to login to FortiGate via SSH.
436580 PDQ_ISW_SSE drops at +/-100K CPS on FG-3700D with FOS 5.4 only.
436746 NP6 counter shows packet drops on FG-1500D. Pure firewall policy without UTM.
439126 Auto-script using diagnose command fails with Unknown action 0 after rebooting
FortiGate.
Release Notes 34
Fortinet, Inc.
Known Issues
Bug ID Description
440448 FG-800C will not get IP on the LTE-modem interface using Novatel U620.
35 Release Notes
Fortinet, Inc.
Limitations
When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may
arise when using the QCOW2 format and existing HDA issues.
Release Notes 36
Fortinet, Inc.
Copyright 2017 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinets General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.