Fortios v7.0.14 Release Notes
Fortios v7.0.14 Release Notes
FortiOS 7.0.14
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
FORTIGUARD LABS
https://www.fortiguard.com
FEEDBACK
Email: [email protected]
Change Log 6
Introduction and supported models 8
Supported models 8
Special branch supported models 8
Special notices 10
Azure-On-Demand image 10
GCP-On-Demand image 10
ALI-On-Demand image 10
Unsupported websites in SSL VPN web mode 11
RDP and VNC clipboard toolbox in SSL VPN web mode 11
CAPWAP offloading compatibility of FortiGate NP7 platforms 11
IP pools and VIPs are now considered local addresses 11
FEC feature design change 12
Hyperscale incompatibilities and limitations 12
SMB drive mapping with ZTNA access proxy 12
Remote access with write rights through FortiGate Cloud 13
Recommended upgrade path from FortiOS 7.0.13 or earlier versions 13
Hyperscale NP7 hardware limitation 13
New features or enhancements 14
Upgrade information 15
Fortinet Security Fabric upgrade 15
Downgrading to previous firmware versions 16
Firmware image checksums 17
IPsec interface MTU value 17
HA role wording changes 17
Strong cryptographic cipher requirements for FortiAP 17
How VoIP profile settings determine the firewall policy inspection mode 18
L2TP over IPsec configuration needs to be manually updated after upgrading from 6.4.x
or 7.0.0 to 7.0.1 and later 19
Add interface for NAT46 and NAT64 to simplify policy and routing configurations 19
Upgrading 19
Creating new policies 20
Example configurations 20
ZTNA configurations and firewall policies 22
Default DNS server update 23
VDOM link and policy configuration is lost after upgrading if VDOM and VDOM link have
the same name 23
BIOS-level signature and file integrity checking during downgrade 24
GUI firmware upgrade does not respect upgrade path 25
Product integration and support 26
Virtualization environments 27
2024-02-08 Updated Fortinet Security Fabric upgrade on page 15 and Resolved issues on page 29.
Added Built-in AV Engine on page 45.
2024-02-12 Added Remote access with write rights through FortiGate Cloud on page 13.
Updated Resolved issues on page 29 and Known issues on page 38.
2024-02-13 Updated Known issues on page 38 and Remote access with write rights through FortiGate
Cloud on page 13.
2024-02-22 Updated Special branch supported models on page 8, and Known issues on page 38.
2024-02-23 Added BIOS-level signature and file integrity checking during downgrade on page 24.
2024-03-18 Updated Resolved issues on page 29 and Known issues on page 38.
2024-04-01 Added GUI firmware upgrade does not respect upgrade path on page 25.
Updated Resolved issues on page 29 and Known issues on page 38.
2024-04-18 Updated Resolved issues on page 29 and Known issues on page 38.
2024-05-15 Updated Resolved issues on page 29 and Known issues on page 38.
2024-05-28 Updated Resolved issues on page 29 and Known issues on page 38.
2024-06-25 Updated Resolved issues on page 29 and Known issues on page 38.
2024-07-25 Added Recommended upgrade path from FortiOS 7.0.13 or earlier versions on page 13.
Updated Known issues on page 38.
2024-08-07 Updated Resolved issues on page 29 and Known issues on page 38.
2024-09-16 Updated Resolved issues on page 29 and Known issues on page 38.
2024-11-28 Updated Resolved issues on page 29 and Known issues on page 38.
This guide provides release information for FortiOS 7.0.14 build 0601.
For FortiOS documentation, see the Fortinet Document Library.
Supported models
The following models are released on a special branch of FortiOS 7.0.14. To confirm that you are running the correct
build, run the CLI command get system status and check that the Branch point field shows 0601.
Azure-On-Demand image
Starting from FortiOS 6.4.3, the FG-VM64-AZUREONDEMAND image is no longer provided. Both Azure PAYG and
Azure BYOL models will share the same FG-VM64-AZURE image for upgrading and new deployments. Remember to
back up your configuration before upgrading.
For ONDEMAND models before 6.4.2, upgrade to 6.4.2 using the FG-VM64-AZUREONDEMAND image. Then, upgrade
to a later build using the FG-VM64-AZURE image.
GCP-On-Demand image
Starting from FortiOS 7.0.0, the FG-VM64-GCPONDEMAND image is no longer provided. Both GCP PAYG and GCP
BYOL models will share the same FG-VM64-GCP image for upgrading and new deployments. Remember to back up
your configuration before upgrading.
For PAYG models with a 6.2.x build, upgrade to the latest 6.4.x build (6.4.5 or later) using the FG-VM64-
GCPONDEMAND image. Then, upgrade to 7.0.x using the FG-VM64-GCP image.
ALI-On-Demand image
Starting from FortiOS 7.0.0, the FG-VM64-ALIONDEMAND image is no longer provided. Both ALI PAYG and ALI BYOL
models will share the same FG-VM64-ALI image for upgrading and new deployments. Remember to back up your
The following websites are not supported in SSL VPN web mode in FortiOS 7.0.1 and later:
l Facebook
l Gmail
l Office 365
l YouTube
Press F8 to access the RDP/VNC clipboard toolbox. The functionality in previous versions with the clipboard toolbox in
the right-hand side of the RDP/VNC page has been removed in FortiOS 7.0.1 and later.
To work with FortiGate NP7 platforms running FortiOS 7.0.1 and later, current FortiAP models whose names end with
letter E or F should be upgraded to the following firmware versions:
l FortiAP (F models): version 6.4.7, 7.0.1, and later
l FortiAP-S and FortiAP-W2 (E models): version 6.4.7, 7.0.1, and later
l FortiAP-U (EV and F models): version 6.2.2 and later
l FortiAP-C (FAP-C24JE): version 5.4.3 and later
The CAPWAP offloading feature of FortiGate NP7 platforms is not fully compatible with FortiAP models that cannot be
upgraded (as mentioned above) or legacy FortiAP models whose names end with the letters B, C, CR, or D. To work
around this issue for these FortiAP models, administrators need to disable capwap-offload under config system
npu and then reboot the FortiGate.
In FortiOS 7.0.13 and later, all IP addresses used as IP pools and VIPs are now considered local IP addresses if
responding to ARP requests on these external IP addresses is enabled (set arp-reply enable, by default). For
these cases, the FortiGate is considered a destination for those IP addresses and can receive reply traffic at the
application layer.
Previously in FortiOS 7.0.1 to 7.0.12, this was not the case. For details on the history of the behavior changes for IP
pools and VIPs, and for issues and their workarounds for the affected FortiOS versions, see Technical Tip: IP pool and
virtual IP behavior changes in FortiOS 6.4, 7.0, 7.2, and 7.4.
The FEC feature design has the following changes starting in FortiOS 7.0.2:
l FEC enabled on FortiGates running 7.0.2 is not backward compatible with FEC enabled on FortiGates running
previous versions.
l In addition to enabling FEC on IPsec interfaces in previous versions, there is a new option, fec, that should also be
enabled under the related firewall policy so the feature works:
config firewall policy
edit <id>
set fec enable
next
end
l The fec option is not automatically enabled in a firewall policy when upgrading from a previous version. It must be
enabled manually.
See Hyperscale firewall incompatibilities and limitations in the Hyperscale Firewall Guide for a list of limitations and
incompatibilities with FortiOS 7.0.14 features.
In FortiOS 7.0.12 and later, SMB drive mapping on a Windows PC made through a ZTNA access proxy becomes
inaccessible after the PC reboots when access proxy with TCP forwarding is configured as FQDN. When configured with
an IP for SMB traffic, same issue is not observed.
One way to solve the issue is to enter the credentials into Windows Credential Manager in the form of
domain\username.
Another way to solve the issue is to leverage the KDC proxy to issue a TGT (Kerberos) ticket for the remote user. See
ZTNA access proxy with KDC to access shared drives for more information. This way, there is no reply in Credential
Manager anymore, and the user is authenticated against the DC.
Remote access with read and write rights through FortiGate Cloud now requires a paid FortiGate Cloud subscription.
The FortiGate can still be accessed in a read-only state with the free tier of FortiGate Cloud. Alternatively, you can
access your FortiGate through its web interface.
Please contact your Fortinet Sales/Partner for details on purchasing a FortiGate Cloud Service subscription license for
your FortiGate device.
For more information see the FortiGate Cloud feature comparison and FortiGate Cloud Administration guide FAQ.
If your device is running on version 7.0.13 or earlier, you must upgrade the device to version 7.0.14 first by following
recommended upgrade path before upgrading to version 7.0.15 or later. Otherwise, the system can hang.
In the event of the system hanging due to the upgrade process to version 7.0.14, boot up from a backup partition using
BIOS, then continue the upgrade by following the upgrade path.
Because of an NP7 hardware limitation, for CGN traffic accepted by a hyperscale firewall policy that includes an
overload with port block allocation (overload PBA) IP Pool, only one block is allocated per client. The setting of the
hyperscale firewall policy cgn-resource-quota option is ignored.
Because of this limitation, under certain rare conditions (for example, only a single server side IP address and port are
being used for a large number of sessions), port allocation may fail even if the block usage of the client is less than its
quota. In cases such as this, if the client has traffic towards some other servers or ports, additional port allocation can
become successful. You can also work around this problem by increasing the IP Pool block size (cgn-block-size).
Feature ID Description
480717 Add new command to all FortiGate models that have dedicated management (mgmt, mgmt1,
mgmt2) ports.
# config system dedicated-mgmt
685910 Added SoC4 driver support for the IEEE 802.1ad, also known as QinQ.
930522 Remote access with read and write rights through FortiGate Cloud now requires a paid FortiGate
Cloud subscription. The FortiGate can still be accessed in a read-only state with the free tier of
FortiGate Cloud. Alternatively, you can access your FortiGate through its web interface.
Please contact your Fortinet Sales/Partner for details on purchasing a FortiGate Cloud Service
subscription license for your FortiGate device.
Supported upgrade path information is available on the Fortinet Customer Service & Support site.
1. Go to https://support.fortinet.com.
2. From the Download menu, select Firmware Images.
3. Check that Select Product is FortiGate.
4. Click the Upgrade Path tab and select the following:
l Current Product
l Current FortiOS Version
l Upgrade To FortiOS Version
5. Click Go.
FortiOS 7.0.14 greatly increases the interoperability between other Fortinet products. This includes:
FortiAnalyzer l 7.0.11
FortiManager l 7.0.11
FortiExtender l 7.0.3 and later. For compatibility with latest features, use latest 7.4 version.
*
If you are using FortiClient only for IPsec VPN or SSL VPN, FortiClient version 6.0 and later are supported.
When upgrading your Security Fabric, devices that manage other devices should be upgraded first.
When using FortiClient with FortiAnalyzer, you should upgrade both to their latest versions.
The versions between the two products should match. For example, if using FortiAnalyzer
7.0.0, use FortiClient 7.0.0.
Upgrade the firmware of each device in the following order. This maintains network connectivity without the need to use
manual steps.
1. FortiAnalyzer
2. FortiManager
3. Managed FortiExtender devices
4. FortiGate devices
5. Managed FortiSwitch devices
6. Managed FortiAP devices
7. FortiClient EMS
8. FortiClient
9. FortiSandbox
10. FortiMail
11. FortiWeb
12. FortiADC
13. FortiDDOS
14. FortiWLC
15. FortiNAC
16. FortiVoice
17. FortiDeceptor
18. FortiAI/FortiNDR
19. FortiTester
20. FortiMonitor
If Security Fabric is enabled, then all FortiGate devices must be upgraded to 7.0.14. When
Security Fabric is enabled in FortiOS 7.0.14, all FortiGate devices must be running FortiOS
7.0.14.
Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings are
retained:
l operation mode
l interface IP/management IP
l static route table
l DNS settings
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support
portal, https://support.fortinet.com. After logging in, go to Support > Firmware Image Checksums (in the Downloads
section), enter the image file name including the extension, and click Get Checksum Code.
IPsec interfaces may calculate a different MTU value after upgrading from 6.4.
This change might cause an OSPF neighbor to not be established after upgrading. The workaround is to set mtu-
ignore to enable on the OSPF interface's configuration:
config router ospf
config ospf-interface
edit "ipsce-vpnx"
set mtu-ignore enable
next
end
end
The term master has changed to primary, and slave has changed to secondary. This change applies to all HA-related
CLI commands and output. The one exception is any output related to VRRP, which remains unchanged.
FortiOS 7.0.0 has removed 3DES and SHA1 from the list of strong cryptographic ciphers. To satisfy the cipher
requirement, current FortiAP models whose names end with letter E or F should be upgraded to the following firmware
versions:
l FortiAP (F models): version 6.4.3 and later
l FortiAP-S and FortiAP-W2 (E models): version 6.2.4, 6.4.1, and later
l FortiAP-U (EV and F models): version 6.0.3 and later
l FortiAP-C (FAP-C24JE): version 5.4.3 and later
If FortiGates running FortiOS 7.0.1 and later need to manage FortiAP models that cannot be upgraded or legacy FortiAP
models whose names end with the letters B, C, CR, or D, administrators can allow those FortiAPs' connections with
weak cipher encryption by using compatibility mode:
config wireless-controller global
set tunnel-mode compatible
end
When upgrading, all firewall policies with a VoIP profile selected will be converted to proxy-based inspection. All firewall
policies that do not have a VoIP profile selected will remain in the same inspection mode after upgrading.
In the case when customers are using the following settings in 6.4:
config system settings
set default-voip-alg-mode proxy-based
end
config firewall policy
edit 0
set inspection-mode flow
unset voip-profile
next
end
In 6.4, by default, SIP traffic is handled by proxy-based SIP ALG even though no VoIP profile is specified in a firewall
policy.
After upgrading, the firewall policy will remain in inspection-mode flow but handled is by flow-based SIP inspection.
Due to the difference in which the SIP traffic is handled by flow-based SIP versus proxy-based SIP ALG inspection in
7.0.0 and later, if customers want to maintain the same behavior after upgrading, they can manually change the firewall
policy's inspection-mode to proxy:
config firewall policy
edit 0
set inspection-mode proxy
unset voip-profile
next
end
Or prior to upgrading, they can assign a voip-profile to the firewall policies that are processing SIP traffic to force the
conversion to inspection-mode proxy after upgrading.
If the setting is not manually updated after upgrading, the VPN connection will be established, but it will not be accessible
from the internal network (office network). This setting change is necessary regardless of whether route-based or policy-
based IPsec is used.
1. Add a static route for the IP range configured in vpn l2tp. For example, if the L2TP setting in the previous
version's root VDOM is:
config vpn l2tp
set eip 210.0.0.254
set sip 210.0.0.1
set status enable
set usrgrp "L2tpusergroup"
end
Add interface for NAT46 and NAT64 to simplify policy and routing
configurations
This update simplifies the policy and routing of NAT46 and NAT64 policies by adding the NAT tunnel interface and
options in firewall vip/vip6 and firewall policy settings. The policy46 and policy64 settings have been
merged into policy, and vip46 and vip64 into vip and vip6. Most firewall policy options can now be used in policies
with NAT46 and NAT64 options enabled.
Upgrading
When upgrading from FortiOS 6.4.x or 7.0.0 to 7.0.1 and later, the old configurations for vip46, vip64, policy46,
policy64, nat64, and gui-nat46-64 will be removed. All objects in them will be removed.
The following CLI commands have been removed:
l config firewall vip46
During the upgrade process after the FortiGate reboots, the following message is displayed:
The config file may contain errors,
Please see details by the command 'diagnose debug config-error-log read'
After upgrading FortiOS 6.4.x or 7.0.0 to 7.0.1 and later, you will need to manually create new vip46 and vip64
policies.
l Create a vip46 from config firewall vip and enable the nat46 option.
l Create a vip64 from config firewall vip6 and enable the nat64 option.
l Create or modify ippool and ippool6, and enable the nat64 or nat46 option.
l Create a policy and enable the nat46 option, apply the vip46 and ippool6 in a policy.
l Create a policy and enable the nat64 option, apply the vip64 and ippool in policy.
l Ensure the routing on the client and server matches the new vip/vip6 and ippool/ippool6.
Example configurations
vip46 object:
ippool6 object:
NAT46 policy:
vip64 object
ippool object
NAT64 policy:
Since FortiOS 7.0.2, ZTNA configurations no longer require a firewall policy to forward traffic to the access proxy VIP.
This is implicitly generated based on the ZTNA rule configuration.
When upgrading from FortiOS 7.0.1 or below:
l If an access-proxy type proxy-policy does not have a srcintf, then after upgrading it will be set to any.
l To display the srcintf as any in the GUI, System > Feature Visibility should have Multiple Interface Policies
enabled.
l All full ZTNA firewall policies will be automatically removed.
Starting in FortiOS 7.0.4, if both primary and secondary DNS servers are set to use the default FortiGuard servers prior
to upgrading, the FortiGate will update them to the new servers and enable DoT after upgrading. If one or both DNS
servers are not using the default FortiGuard server, upgrading will retain the existing DNS servers and DNS protocol
configuration.
Affected versions:
l FortiOS 6.4.9 and later
l FortiOS 7.0.6 and later
l FortiOS 7.2.0 and later
When upgrading to one of the affected versions, there is a check within the set vdom-links function that rejects vdom-
links that have the same name as a VDOM. Without the check, the FortiGate will have a kernel panic upon bootup
during the upgrade step.
A workaround is to rename the vdom-links prior to upgrading, so that they are different from the VDOMs.
When downgrading to a version of FortiOS prior to 6.4.13, 7.0.12, and 7.2.5 that does not support BIOS-level signature
and file integrity check during bootup, the following steps should be taken if the BIOS version of the FortiGate matches
the following versions:
l 6000100 or greater
l 5000100 or greater
To downgrade or upgrade to or from a version that does not support BIOS-level signature and file
integrity check during bootup:
1. If the current security level is 2, change the security level to 0. This issue does not affect security level 1 or below.
2. Downgrade to the desired FortiOS firmware version.
3. If upgrading back to 6.4.13, 7.0.12, 7.2.5, 7.4.0, or later, ensure that the security level is set to 0.
4. Upgrade to the desired FortiOS firmware version.
5. Change the security level back to 2.
When performing a firmware upgrade that requires multiple version jumps, the Follow upgrade path option in the GUI
does not respect the recommended upgrade path, and instead upgrades the firmware directly to the final version. This
can result in unexpected configuration loss. To upgrade a device in the GUI, upgrade to each interim version in the
upgrade path individually.
For example, when upgrading from 7.0.7 to 7.0.12 the recommended upgrade path is 7.0.7 -> 7.0.9 -> 7.0.11 -> 7.0.12.
To ensure that there is no configuration loss, first upgrade to 7.0.9, then 7.0.11, and then 7.0.12.
The following table lists FortiOS 7.0.14 product integration and support information:
Other browser versions have not been tested, but may fully function.
Other web browsers may function correctly, but are not supported by Fortinet.
Other browser versions have not been tested, but may fully function.
Other web browsers may function correctly, but are not supported by Fortinet.
Fortinet Single Sign-On l 5.0 build 0314 and later (needed for FSSO agent support OU in group filters)
(FSSO) l Windows Server 2022 Standard
l Windows Server 2022 Datacenter
l Windows Server 2019 Standard
l Windows Server 2019 Datacenter
l Windows Server 2019 Core
l Windows Server 2016 Datacenter
l Windows Server 2016 Standard
l Windows Server 2016 Core
l Windows Server 2012 Standard
l Windows Server 2012 R2 Standard
l Windows Server 2012 Core
l Windows Server 2008 64-bit (requires Microsoft SHA2 support
package)
l Windows Server 2008 R2 64-bit (requires Microsoft SHA2 support
package)
l Windows Server 2008 Core (requires Microsoft SHA2 support package)
l Novell eDirectory 8.8
AV Engine l 6.00295
Virtualization environments
Language support
Language support
Language GUI
English ✔
Chinese (Simplified) ✔
Chinese (Traditional) ✔
French ✔
Japanese ✔
Korean ✔
Portuguese (Brazil) ✔
Spanish ✔
The following table lists the operating systems and web browsers supported by SSL VPN web mode.
Microsoft Windows 7 SP1 (32-bit & 64-bit) Mozilla Firefox version 113
Google Chrome version 113
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
The following issues have been fixed in version 7.0.14. To inquire about a particular bug, please contact Customer
Service & Support.
Application Control
Bug ID Description
820481 For firewall policies using inspection-mode proxy, some HTTP/2 sessions may be invalidly detected
as unknown application.
DNS Filter
Bug ID Description
907365 DNS proxy caches DNS responses with only one CNAME record.
Endpoint Control
Bug ID Description
979811 The ZTNA channel is not cleaned when overwriting old lls entries.
Explicit Proxy
Bug ID Description
901627 Explicit proxy and SD-WAN fail to match a policy if the destination has multiple zones set.
942612 Web proxy forward server does not convert HTTP version to the original version when sending them
back to the client.
978473 Explicit proxy policy function issues when matching external-threat feed categories.
Firewall
Bug ID Description
953907 Virtual wire pair interface drops all packet if the prp-port-in/prp-port-out setting is
configured under system npu-setting prp on FG-101F.
977641 In transparent mode, multicast packets are not forwarded through the bridge and are dropped.
GUI
Bug ID Description
848660 Read-only administrator may encounter a Maximum number of monitored interfaces reached error
when viewing an interface bandwidth widget for an interface that does not have the monitor
bandwidth feature enabled.
867802 GUI always displays Access denied error after logging in.
969101 Administrators with custom permissions cannot load the Managed FortiAP page, even if they have
WiFi read-write permissions.
HA
Bug ID Description
871636 HA configuration synchronization packets (Ethertype 0x8893) are dropped when going through
VXLAN.
904117 When walking through the session list to change the ha_id, some dead sessions could be freed
one more time.
924671 There is no response on ha-mgmt-interfaces after a reboot when using a VLAN interface
based on hd-sw as the ha-mgmt interface.
937246 An error condition occurred while forwarding over a VRRP address, caused by the creation of a new
VLAN.
949352 The user.radius checksum is the same in both HA units, but the GUI shows a different checksum on
the secondary and the HA status is out of sync.
962681 In a three member A-P cluster, the dhcp lease list (execute dhcp lease-list) might be empty
on secondary units.
Hyperscale
Bug ID Description
984852 The HA/AUX ports are not enabled on boot up when using the NPU path option.
Intrusion Prevention
Bug ID Description
923393 IPS logs show incorrect source and destination IP addresses and policy IDs, and the ports are
zeros.
IPsec VPN
Bug ID Description
897867 IPsec VPN between two FortiGates (100F and 60F) experiences slow throughput compared to the
available underlay bandwidth.
898961 diagnose traffictest issues with dynamic IP addresses and loopback interfaces.
921691 In FGSP, IKE routes are not removed from the kernel when secondary-add-ipsec-routes is
disabled.
926002 Incorrect traffic order in IPsec aggregate redundant member list after upgrade.
945873 Inconsistency of mode-cfg between phase 1 assigned IP address and destination selector
addition.
950012 IPsec traffic may stop for the SOC4 platform due to a rare error condition.
961305 FortiGate is sending ESP packets with source MAC address of port1 HA virtual MAC address.
968218 When the IPsec tunnel destination MAC address is changed, tunnel traffic may stop.
Bug ID Description
940814 Administrators without read permissions for the threat weight feature cannot see the event log
menu.
954565 Although there is enough disk space for logging, IPS archive full message is shown.
965247 FortiGate syslog format in reliable transport mode is not compliant with RFC 6587.
967692 The received traffic counter is not increasing when the traffic is HTTPS with webfilter.
987261 In the webfilter content block UTM log in proxy inspection mode, sentbyte and rcvdbyte are
zero.
Proxy
Bug ID Description
790426 An error case occurs in WAD while redirecting the web filter HTTPS sessions.
806556 Unexpected behavior in WAD when the ALPN is set to http2 in the ssl-ssh-profile.
828917, Unexpected behavior in WAD when there are multiple LDAP servers configured on the FortiGate.
919781
845361 A rare error condition occurred in WAD caused by compounded SMB2 requests.
940149 Inadvertent traffic disruption caused by WAD when it receives an HTTP2 data frame payload on a
dead stream.
947814 Too many redirects on TWPP after the second KRB keytab is configured.
954104 An error case occurs in WAD when WAD gets the external authenticated users from other
daemons.
Routing
Bug ID Description
781483 Incorrect BGP Originator_ID from route reflector seen on receiving spokes.
890954 The change of an IPv6 route does not mark sessions as dirty nor trigger a route change.
914815 FortiGate 40F-3G4G not adding LTE dynamic route to route table.
Bug ID Description
926525 Routing information changed log is being generated from secondary in an HA cluster.
952908 Locally originated type 5 and 7 LSAs' forward address value is incorrect.
954100 Packet loss status in SD-WAN health check occur after an HA failover.
Security Fabric
Bug ID Description
782518 Threat feeds are showing that the connection status has not started when it should be connected.
956423 In HA, the primary unit may sometimes show a blank GUI screen.
SSL VPN
Bug ID Description
894704 FortiOS check would block iOS and Android mobile devices from connecting to the SSL VPN
tunnel.
898889 The internal website does not load completely with SSL VPN web mode.
906756 Update SSL VPN host check logic for unsupported OS.
957406 OS checklist for SSL VPN in FortiOS does not include macOS Sonoma 14.
Switch Controller
Bug ID Description
816790 Console printed DSL related error messages when disconnecting the managed FortiSwitch and
connecting to the FortiGate again.
858749 Redirected traffic should not hit the firewall policy when allow-traffic-redirect is enabled.
911232 Security rating shows an incorrect warning for unregistered FortiSwitches on the WiFi & Switch
Controller > Managed FortiSwitches.
937065 On the WiFi & Switch Controller > FortiSwitch Ports page, FortiSwitch ports that are exported to
non-root VDOMs are incorrectly shown as down.
Bug ID Description
This is a GUI issue that does not affect the functioning of the exported ports. The correct port status
can be seen on the port tooltip, or using the CLI.
System
Bug ID Description
631046 diagnose sys logdisk smart does not work for NVMe disk models.
733096 FG-100F HA secondary's unused ports flaps from down to up, then to down.
763739 On FG-200F, the Outbound bandwidth in the Bandwidth widget does not match outbandwidth
setting.
882187 FortiGate might enter conserve mode if disk logging is enabled and log-traffic all is set in a
policy.
888655 FortiGate queries system DNS for A <Root> and AAAA <Root> servers.
909225 ISP traffic is failing with the LAG interfaces on upstream switches.
912092 FortiGate does not send ARP probe for UDP NP-offloaded sessions.
916493 Fail detection function does not work properly on X1 and X2 10G ports.
919901 For FIPS-CC mode, the strict check for basic constraints should be removed for end entity
certificates.
929904 When L3 or L4 hashing algorithm is used, traffic is not forwarded over the same aggregate member
after being offloaded by NP7.
937982 High CPU usage might be observed on entry-level FortiGates if the cache size reaches 10% of the
system memory.
938174 ARP issue with VXLAN over IPsec and Soft Switch.
938981 The virtual server http-host algorithm is redirecting requests to an unexpected server.
943948 FortiGate as L2TP client is not working with Cisco ASR as L2TP server.
946413 Temperature sensor value missing for FG-180xF, FG-420xF, and FG-440xF platforms.F
947240 FortiGate is not able to resolve ARPs of few hosts due to their ARP replies not reaching the primary
FPM.
955074 MSS clamping is not working on VXLAN over IPsec after upgrading.
Bug ID Description
960707 Egress shaping does not work on NP when applied on the WAN interface.
962153 A port that uses a copper-transceiver does not update the link status in real-time.
963600 SolarWinds unable to negotiate encryption, no matching host key type found.
971404 Session expiration does not get updated for offloaded traffic between a specific host range.
Bug ID Description
837185 Automatic certificate name generation is the same for global and VDOM remote certificates, which
can cause certificates to exist with the same name.
VM
Bug ID Description
938382 OpenStack Queens FortiGate VM HA heartbeat on broadcast is not working as expected due to
mlx5 vfnic not being ready as an HA interface.
968740 Unexpected behavior in awsd caused by tags with an empty value on AWS instances while adding
a new AWS Fabric connector.
WAN Optimization
Bug ID Description
954541 In WANOpt transparent mode, WAN optimization does not keep the original source address of the
packets.
Web Filter
Bug ID Description
925801 Custom Images are not seen on Web Filter block replacement page for HTTP traffic in flow mode.
982156 The URL local/user category rating result has only one best match category (longest URL pattern
match), and other matched local/user categories cannot be chosen even if the category is
configured in the profile.
WiFi Controller
Bug ID Description
The following issues have been identified in version 7.0.14. To inquire about a particular bug or report a bug, please
contact Customer Service & Support.
Firewall
Bug ID Description
843554 If the first firewall service object in the service list (based on the order in the command line table) has
a protocol type of IP, the GUI may incorrectly modify its protocol number whenever a new firewall
service of the same protocol type IP is created in the GUI.
This silent misconfiguration can result in unexpected behavior of firewall policies that use the
impacted service. For example, some 6K and 7K platforms have firewall service ALL (protocol type
IP) as the first service, and this can cause the ALL service to be modified unexpectedly.
Workaround: create a new service in the CLI, or move a non-IP type services to the top of the
firewall service list. For example, if ALL is the first firewall service in the list:
config firewall service custom
edit "unused"
set tcp-portrange 1
next
move "unused" before "ALL"
end
912740 On a FortiGate managed by FortiManager, after upgrading to 7.0.13, the Firewall Policy list may
show separate sequence grouping for each policy because the global-label is updated to be
unique for each policy.
Workaround: drag and drop the policy to the correct sequence group in the GUI, or remove the
global-label for each member policy in the group except for the leading policy.
l Policy 1 (global-label "group1")
l Policy 2
l Policy 3 (global-label "group2")
l Policy 4
951984 For local out DNAT traffic, the best output route may not be found.
Bug ID Description
985508 When allow-traffic-redirect is enabled, redirect traffic that ingresses and egresses from
the same interface may incorrectly get dropped if the source address of the incoming packet is
different from the FortiGate's interface subnet and there is no firewall policy to allow the matched
traffic.
Workaround: disable allow-traffic-redirect and create a firewall policy to allow traffic to
ingress and egress for the same interface.
config system global
set allow-traffic-redirect disable
end
FortiView
Bug ID Description
941521 On the Dashboard > FortiView Websites page, the Category filter does not work in the Japanese
GUI.
GUI
Bug ID Description
440197 On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates
shows an Unknown status, even if the server is working correctly. This is a display issue only; the
override feature is working properly.
677806 On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows
the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows
the correct status.
685431 On the Policy & Objects > Firewall Policy page, the policy list can take around 30 seconds or more
to load when there is a large number (over 20 thousand) of policies.
Workaround: use the CLI to configure policies.
707589 System > Certificates list sometimes shows an incorrect reference count for a certificate, and
incorrectly allows a user to delete a referenced certificate. The deletion will fail even though a
success message is shown. Users should be able to delete the certificate after all references are
removed.
708005 When using the SSL VPN web portal in the Firefox, users cannot paste text into the SSH terminal
emulator.
Workaround: use Chrome, Edge, or Safari as the browser.
Bug ID Description
755177 When upgrading firmware from 7.0.1 to 7.0.2, the GUI incorrectly displays a warning saying this is
not a valid upgrade path.
810225 An undefined error is displayed when changing an administrator password for the first time. Affected
models: NP7 platforms.
853352 When viewing entries in the slide-out window of the Policy & Objects > Internet Service Database
page, users cannot scroll down to the end if there are over 100000 entries.
898902 In the System > Administrators dialog, when there are a lot of VDOMs (over 200), the dialog can
take more than one minute to load the Two-factor Authentication toggle. This issue does not affect
configuring other settings in the dialog.
Workaround: use the CLI to configure two-factor-authentication under config system
admin.
974988 FortiGate GUI should not show a license expired notification due to an expired device-level
FortiManager Cloud license if it still has a valid account-level FortiManager Cloud license (function
is not affected).
HA
Bug ID Description
1011674 Upgrading from 7.0.14 or 7.2.8 on the HA secondary device will fail with BIOS security level 2. The
image is marked un-certified and the upgrade process is aborted. The HA cluster is not
affected.
Hyperscale
Bug ID Description
811109 FortiGate 4200F, 4201F, 4400F, and 4401F HA1, HA2, AUX1, and AUX2 interfaces cannot be
added to an LAG.
836976 Sessions being processed by hyperscale firewall policies with hardware logging may be dropped
when dynamically changing the log-processor setting from hardware to host for the hardware
log sever added to the hyperscale firewall policy. To avoid dropping sessions, change the log-
processor setting during quiet periods.
838654 Hit count not ticking for implicit deny policy for hardware session in case of NAT46 and NAT64
traffic.
842659 srcaddr-negate and dstaddr-negate are not working properly for IPv6 traffic with FTS.
Bug ID Description
843132 Access control list (ACL) policies added to a hyperscale firewall VDOM that is processing traffic may
take longer than expected to become effective. During a transition period, traffic that should be
blocked by the new ACL policy will be allowed.
843197 Output of diagnose sys npu-session list/list-full does not mention policy route
information.
843266 Diagnose command should be available to show hit_count/last_used for policy route and NPU
session on hyperscale VDOM.
843305 Get PARSE SKIP ERROR=17 NPD ERR PBR ADDRESS console error log when system boots up.
844421 The diagnose firewall ippool list command does not show the correct output for
overload type IP pools.
846520 NPD/LPMD process killed by out of memory killer after running mixed sessions and HA failover.
941784 Hardware session synchronization does not work on FG-480xF devices in hyperscale.
986656 On the HA primary unit, the npu-session list shows many sessions, but the npu-session state shows
0.
IPsec VPN
Bug ID Description
761754 IPsec aggregate static route is not marked inactive if the IPsec aggregate is down.
945368 Disabling src-check (RPF) on the parent tunnel is not inherited by ADVPN shortcuts.
1009332 Traffic is interrupted on SPOKEs after upgrading to version 7.0.14 due to one NPU SA race
condition.
Bug ID Description
850642 Logs are not seen for traffic passing through the firewall caused by numerous simultaneous
configuration changes.
872493 Disk logging files are cached in the kernel, causing high memory usage.
Proxy
Bug ID Description
1001497 FortiGate may enter conserve mode when posting a non or invalid HTTP date through web proxy.
Security Fabric
Bug ID Description
614691 Slow GUI performance in large Fabric topology with over 50 downstream devices.
794703 Security Rating report for Rogue AP Detection and FortiCare Support checks show incorrect
results.
862424 On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables), security
rating reports may cause the FortiGate to go into conserve mode.
903922 Security Fabric physical and logical topology is slow to load when there are a lot of downstream
devices, including FortiGates, FortiSwitches, FortiAPs, and endpoint device traffic. This is a GUI
only display issue and does not impact operations of downstream devices.
System
Bug ID Description
847664 Console may display mce: [Hardware Error] error message after fresh image burn or reboot.
861962 When configuring an 802.3ad aggregate interface with a 1 Gbps speed, the port's LED is off and
traffic cannot pass through. Affected platforms: 110xE, 220xE, 330xE, 340xE, and 360xE.
901721 In a certain edge case, traffic directed towards a VLAN interface could trigger a kernel interruption.
934708 The cmdbsvr could not secure the var_zone lock due to another process holding it indefinitely.
975496 FortiGate 200F experiences slow download and upload speeds when traversing from a 1G to a 10G
interface.
1000884 SCM tools prevent users from logging into FortiGate using SSH after an upgrade.
1003026 On SoC3/SoC4 platforms, a kernel interruption may occur when running WAD monitoring scripts.
1041457 The kernel 4.19 cannot concurrently reassemble IPv4 fragments for a source IP with more than 64
destination IP addresses.
Upgrade
Bug ID Description
925567 When upgrading multiple firmware versions in the GUI, the Follow upgrade path option does not
respect the recommended upgrade path.
Bug ID Description
1000108 Guest-management administrators cannot see or print guest user passwords in plain text; the
password is masked as ENC XXXX string.
Workaround: Change the password generation method to specify so that the guest
administrator can provide a custom password for each user.
VM
Bug ID Description
Web Filter
Bug ID Description
766126 Block replacement page is not pushed automatically to replace the video content when using a
video filter.
WiFi Controller
Bug ID Description
814541 When there are extra large number of managed FortiAP devices (over 500) and large number of
WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long
time to load. This issue does not impact FortiAP operation.
Bug ID Description
989929 A kernel interruption occurs on FWF-40F/60F models when WiFi stations connect to SSID on the
local radio.
1001672 FortiWiFi reboots or becomes unresponsive when connecting to SSID after upgrading to 7.0.14.
1004338 After an upgrade or reboot on the NP7 platform, WiFi data cannot pass through when the SSID
VLAN interface uses the DHCP Relay Server.
ZTNA
Bug ID Description
819987 SMB drive mapping made through a ZTNA access proxy is inaccessible after rebooting.
848222 ZTNA TCP forwarding is not working when a real server is configured with an FQDN address type.
An FQDN address type that can resolve public IPs is not recommended for ZTNA TCP forwarding
on real servers because the defined internal DNS database zone is trying to override it at the same
time. By doing so, the internal private address may not take effect after rebooting, and causes a
ZTNA TCP forwarding failure due to the real server not being found.
AV Engine 6.00295 is released as the built-in AV Engine. Refer to the AV Engine Release Notes for information.
IPS Engine 7.00180 is released as the built-in IPS Engine. Refer to the IPS Engine Release Notes for information.
l VHD
l OVF
l The XVA format comes pre-configured with default configurations for VM name, virtual CPU, memory, and virtual
NIC. Other formats will require manual configuration before the first power on process.
When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may arise
when using the QCOW2 format and existing HDA issues.
FortiGate Rugged 60F and 60F 3G4G models have various generations defined as follows:
l Gen1
l Gen2 = Gen1 + TPM
l Gen3 = Gen2 + Dual DC-input
l Gen4 = Gen3 + GPS antenna
l Gen5 = Gen4 + memory
The following HA clusters can be formed:
l Gen1 and Gen2 can form an HA cluster.
l Gen4 and Gen5 can form an HA cluster.
l Gen1 and Gen2 cannot form an HA cluster with Gen3, Gen4, or Gen5 due to differences in the config system
vin-alarm command.
Copyright© 2025 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.