Fortios v5.4.5 Release Notes
Fortios v5.4.5 Release Notes
VERSION5.4.5
FORTINET DOCUMENTLIBRARY
http://docs.fortinet.com
FORTINETVIDEOGUIDE
http://video.fortinet.com
FORTINETBLOG
https://blog.fortinet.com
CUSTOMERSERVICE&SUPPORT
https://support.fortinet.com
FORTIGATECOOKBOOK
http://cookbook.fortinet.com
FORTINETTRAININGSERVICES
http://www.fortinet.com/training
FORTIGUARDCENTER
http://www.fortiguard.com
FEEDBACK
Email: [email protected]
01-545-424040-20170615
TABLEOFCONTENTS
Change Log 5
Introduction 6
Supported models 6
Special branch supported models 7
Whats new in FortiOS 5.4.5 8
Special Notices 9
Built-In Certificate 9
Default log setting change 9
FortiAnalyzer Support 9
Removed SSL/HTTPS/SMTPS/IMAPS/POP3S 9
FortiGate and FortiWiFi-92D Hardware Limitation 9
FG-900D and FG-1000D 10
FG-3700DX 10
FortiGate units managed by FortiManager 5.0 or 5.2 10
FortiClient Support 10
FortiClient (Mac OS X) SSL VPN Requirements 11
FortiGate-VM 5.4 for VMware ESXi 11
FortiClient Profile Changes 11
FortiPresence 11
Log Disk Usage 11
SSL VPN setting page 12
FG-30E-3G4G and FWF-30E-3G4G MODEM Firmware Upgrade 12
Use of dedicated management interfaces (mgmt1 and mgmt2) 12
Upgrade Information 13
Upgrading to FortiOS 5.4.5 13
Upgrading to FortiOS 5.6.0 13
Cooperative Security Fabric Upgrade 13
FortiGate-VM 5.4 for VMware ESXi 14
Downgrading to previous firmware versions 14
Amazon AWS Enhanced Networking Compatibility Issue 14
FortiGate VM firmware 15
Firmware image checksums 15
Product Integration and Support 16
FortiOS 5.4.5 support 16
Language support 19
SSL VPN support 19
SSL VPN standalone client 19
SSL VPN web mode 20
SSL VPN host compatibility list 20
Resolved Issues 22
Known Issues 31
Limitations 37
Citrix XenServer limitations 37
Open Source XenServer limitations 37
Change Log
Change Log
Added FGT-140 and FGT-140-POE to Introduction > Supported models > Special
branch supported models.
5 Release Notes
Fortinet, Inc.
Introduction
This document provides the following information for FortiOS 5.4.5 build 1138:
l Special Notices
l Upgrade Information
l Product Integration and Support
l Resolved Issues
l Known Issues
l Limitations
See the Fortinet Document Library for FortiOS documentation.
Supported models
FortiOS 5.4.5 supports the additional CPU cores through a license update on the
following VM models:
FortiOS Carrier FortiOS Carrier 5.4.5 images are delivered upon request and are not available on the
customer support firmware download page.
Release Notes 6
Fortinet, Inc.
Introduction Supported models
7 Release Notes
Fortinet, Inc.
Whats new in FortiOS 5.4.5 Introduction
For a detailed list of new features and enhancements that have been made in FortiOS 5.4.5, see the Whats
New for FortiOS 5.4.5 document available in the Fortinet Document Library.
Release Notes 8
Fortinet, Inc.
Special Notices
Built-In Certificate
FortiGate and FortiWiFi D-series and above have a built in Fortinet_Factory certificate that uses a 2048-bit
certificate with the 14 DH group.
For FG-5000 blades, log disk is disabled by default. It can only be enabled via CLI. For all 2U & 3U models
(FG-3600/FG-3700/FG-3800), log disk is also disabled by default. For all 1U models and desktop models that
supports SATA disk, log disk is enabled by default.
FortiAnalyzer Support
In version 5.4, encrypting logs between FortiGate and FortiAnalyzer is handled via SSL encryption. The IPsec
option is no longer available and users should reconfigure in GUI or CLI to select the SSL encryption option as
needed.
Removed SSL/HTTPS/SMTPS/IMAPS/POP3S
SSL/HTTPS/SMTPS/IMAPS/POP3S options were removed from server-load-balance on low end models below
FG-100D except FG-80C and FG-80CM.
FortiOS 5.4.0 reported an issue with the FG-92D model in the Special Notices > FG-92D High Availability in
Interface Mode section of the release notes. Those issues, which were related to the use of port 1 through 14,
include:
9 Release Notes
Fortinet, Inc.
FG-900D and FG-1000D Special Notices
l ARP (0x0806), IPv4 (0x0800), and VLAN (0x8100) packets are allowed
l BPDUs are dropped and therefore no STP loop results
l PPPoE packets are dropped
l IPv6 packets are dropped
l FortiSwitch devices are not discovered
l HA may fail to form depending the network topology
l All packet types are allowed, but depending on the network topology, an STP loop may result
CAPWAP traffic will not offload if the ingress and egress traffic ports are on different NP6 chips. It will only offload
if both ingress and egress ports belong to the same NP6 chip.
FG-3700DX
CAPWAP Tunnel over the GRE tunnel (CAPWAP + TP2 card) is not supported.
Any FortiGate unit managed by FortiManager 5.0.0 or 5.2.0 may report installation failures on newly created
VDOMs, or after a factory reset of the FortiGate unit even after a retrieve and re-import policy.
FortiClient Support
Only FortiClient 5.4.1 and later is supported with FortiOS 5.4.1 and later. Upgrade managed FortiClients to 5.4.1
or later before upgrading FortiGate to 5.4.1 or later.
Note that the FortiClient license should be considered before upgrading. Full featured
FortiClient 5.2, and 5.4 licenses will carry over into FortiOS 5.4.1 and later. Depending
on the environment needs, FortiClient EMS license may need to be purchased for
endpoint provisioning. Please consult Fortinet Sales or your reseller for guidance on
the appropriate licensing for your organization.
The perpetual FortiClient 5.0 license (including the 5.2 limited feature upgrade) will
not carry over into FortiOS 5.4.1 and later. A new license will need to be procured for
either FortiClient EMS or FortiGate. To verify if a license purchase is compatible with
5.4.1 and later, the SKU should begin with FC-10-C010.
Release Notes 10
Fortinet, Inc.
Special Notices FortiClient (Mac OS X) SSL VPN Requirements
When using SSL VPN on Mac OS X 10.8, you must enable SSLv3 in FortiOS.
Upon upgrading to FortiOS 5.4.5, FortiGate-VM v5.4 for VMware ESXi (all models), no longer supports the
VMXNET2 vNIC driver.
With introduction of the Cooperative Security Fabric in FortiOS, FortiClient profiles will be updated on FortiGate.
FortiClient profiles and FortiGate are now primarily used for Endpoint Compliance, and FortiClient Enterprise
Management Server (EMS) is now used for FortiClient deployment and provisioning.
In the FortiClient profile on FortiGate, when you set the Non-Compliance Action setting to Auto-Update, the
FortiClient profile supports limited provisioning for FortiClient features related to compliance, such as AntiVirus,
Web Filter, Vulnerability Scan, and Application Firewall. When you set the Non-Compliance Action setting to
Block or Warn, you can also use FortiClient EMS to provision endpoints, if they require additional other features,
such as VPN tunnels or other advanced options. For more information, see the FortiOS Handbook Security
Profiles.
When you upgrade to FortiOS 5.4.1 and later, the FortiClient provisioning capability
will no longer be available in FortiClient profiles on FortiGate. FortiGate will be used
for endpoint compliance and Cooperative Security Fabric integration, and FortiClient
Enterprise Management Server (EMS) should be used for creating custom FortiClient
installers as well as deploying and provisioning FortiClient on endpoints. For more
information on licensing of EMS, contact your sales representative.
FortiPresence
FortiPresence users must change the FortiGate web administration TLS version in order to allow the connections
on all versions of TLS. Use the following CLI command.
config system global
set admin-https-ssl-versions tlsv1-0 tlsv1-1 tlsv1-2
end
Users are able to toggle disk usage between Logging and WAN Optimization for single disk FortiGates.
To view a list of supported FortiGate models, refer to the FortiOS 5.4.0 Feature Platform Matrix.
11 Release Notes
Fortinet, Inc.
SSL VPN setting page Special Notices
The default server certificate has been changed to the Fortinet_Factory option. This excludes FortiGate-
VMs which remain at the self-signed option. For details on importing a CA signed certificate, please see the
How to purchase and import a signed SSL certificate document.
The 3G4G MODEM firmware on the FG-30E-3G4G and FWF-30E-3G4G models may require updating. Upgrade
instructions and the MODEM firmware have been uploaded to the Fortinet Customer Service & Support site.
Log in and go to Download>Firmware. In the Select Product list, select FortiGate, and click the Download tab.
The upgrade instructions are in the following directory:
.../FortiGate/v5.00/5.4/Sierra-Wireless-3G4G-MODEM-Upgrade/
For optimum stability, use management ports (mgmt1 and mgmt2) for management traffic only. Do not use
management ports for general user traffic.
Release Notes 12
Fortinet, Inc.
Upgrade Information
FortiOS version 5.4.5 officially supports upgrading from version 5.4.3 and later and 5.2.9 and later.
When upgrading from a firmware version beyond those mentioned in the Release
Notes, a recommended guide for navigating the upgrade path can be found on the
Fortinet documentation site.
There is a separate version of the guide describing the safest upgrade path to the
latest patch of each of the supported versions of the firmware. To upgrade to this
build, go to FortiOS 5.4 Supported Upgrade Paths.
If you have configured IPsec in version 5.4.5, after upgrading to 5.6.0, you must
reconfigure all IPsec phase1 psksecret settings before you can establish an IPsec
tunnel.
FortiOS 5.4.1 and later greatly increases the interoperability between other Fortinet products. This includes:
13 Release Notes
Fortinet, Inc.
FortiGate-VM 5.4 for VMware ESXi Upgrade Information
Upon upgrading to FortiOS 5.4.5, FortiGate-VM v5.4 for VMware ESXi (all models), no longer supports the
VMXNET2 vNIC driver.
Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings
are retained:
l operation mode
l interface IP/management IP
l static route table
l DNS settings
l VDOM parameters/settings
l admin user account
l session helpers
l system access profiles
When downgrading from 5.4 to 5.2, users will need to reformat the log disk.
Downgrading to older versions from 5.4.1 or later running the enhanced nic driver is not allowed. The following
AWS instances are affected:
l C3
l C4
l R3
l I2
l M4
l D2
Release Notes 14
Fortinet, Inc.
Upgrade Information FortiGate VM firmware
FortiGate VM firmware
Fortinet provides FortiGate VM firmware images for the following virtual environments:
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.OpenXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains the QCOW2 file for Open Source XenServer.
l .out.CitrixXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.
Linux KVM
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.kvm.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
QCOW2 that can be used by qemu.
Microsoft Hyper-V
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.hyperv.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains three folders that can be imported by Hyper-V Manager on Hyper-V 2012. It also contains the file
fortios.vhd in the Virtual Hard Disks folder that can be manually added to the Hyper-V Manager.
l .out: Download either the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .ovf.zip: Download either the 64-bit package for a new FortiGate VM installation. This package contains
Open Virtualization Format (OVF) files for VMware and two Virtual Machine Disk Format (VMDK) files used by
the OVF file during deployment.
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service &
Support portal, https://support.fortinet.com. After logging in select Download > Firmware Image Checksums,
enter the image file name including the extension, and select Get Checksum Code.
15 Release Notes
Fortinet, Inc.
Product Integration and Support
The following table lists 5.4.5 product integration and support information:
FortiManager For the latest information, see the FortiManager and FortiOS
Compatibility.
You should upgrade your FortiManager prior to upgrading the
FortiGate.
FortiAnalyzer For the latest information, see the FortiAnalyzer and FortiOS
Compatibility.
You should upgrade your FortiAnalyzer prior to upgrading the
FortiGate.
Release Notes 16
Fortinet, Inc.
Product Integration and Support FortiOS 5.4.5 support
Fortinet Single Sign-On l 5.0 build 0256 and later (needed for FSSO agent support OU in
(FSSO) group filters)
l Windows Server 2016 Standard
l Windows Server 2008 (32-bit and 64-bit)
l Windows Server 2008 R2 64-bit
l Windows Server 2012 Standard
l Windows Server 2012 R2 Standard
l Novell eDirectory 8.8
l 4.3 build 0164 (contact Support for download)
l Windows Server 2003 R2 (32-bit and 64-bit)
l Windows Server 2008 (32-bit and 64-bit)
l Windows Server 2008 R2 64-bit
l Windows Server 2012 Standard Edition
l Windows Server 2012 R2
l Novell eDirectory 8.8
FSSO does not currently support IPv6.
17 Release Notes
Fortinet, Inc.
FortiOS 5.4.5 support Product Integration and Support
FortiExtender l 3.0.0
l 2.0.2 and later
AV Engine l 5.247
Virtualization Environments
Microsoft l Hyper-V Server 2008 R2, 2012, 2012 R2, and 2016
FortiGate-VM v5.4 for VMware ESXi (all models), no longer supports the VMXNET2
vNIC driver.
Release Notes 18
Fortinet, Inc.
Product Integration and Support Language support
Language support
Language support
Language GUI
English
Chinese (Simplified)
Chinese (Traditional)
French
Japanese
Korean
Portuguese (Brazil)
Spanish (Spain)
Linux CentOS 6.5 / 7 (32-bit & 64-bit) 2333. Download from the Fortinet Developer
Network https://fndn.fortinet.net.
Linux Ubuntu 16.04
Other operating systems may function correctly, but are not supported by Fortinet.
SSL VPN standalone client no longer supports the following operating systems:
19 Release Notes
Fortinet, Inc.
SSL VPN support Product Integration and Support
Microsoft Windows 7 SP1 (32-bit & 64-bit) Microsoft Internet Explorer version 11
Mozilla Firefox
Google Chrome
Google Chrome
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
Release Notes 20
Fortinet, Inc.
Product Integration and Support SSL VPN support
21 Release Notes
Fortinet, Inc.
Resolved Issues
The following issues have been fixed in version 5.4.5. For inquires about a particular bug, please contact
Customer Service & Support.
AntiVirus
Bug ID Description
392200 Encrypted archive log is generated even though the function archive-log in antivirus profile is
unset.
DLP
Bug ID Description
Firewall
Bug ID Description
304276 Policy real time view shows incorrect statistic in session offload to np6.
395241 After IPS is enabled on LB-VIP policy, this message displays: ipsapp session open
failed: all providers busy.
416111 FQDN address is unresolved in a VDOM although the URL is resolved with IP.
GUI
Bug ID Description
283682 Cannot delete FSSO-polling AD group from LDAP list tree window in FSSO-user GUI.
371149 30D GUI should support FortiSwitch controller feature when CLI supports it.
372898 User group name should escape XSS script at User Groups page.
Release Notes 22
Fortinet, Inc.
Resolved Issues
Bug ID Description
374166 Using Edge cannot select the firewall address when configuring a static route.
374350 Field pre-shared key may be unavailable when editing the IPsec dialup tunnel created
through the VPN wizard.
378428 FortiGate logs a connection of category deny (red sign) even though traffic is allowed
through policy.
379331 DHCP Monitor page does not fully display the page selector pane.
384532 Cannot set IPsec vpn xauth user group inherit from policy in GUI when setting
xauthtype auto server.
385482 Webui loads indefinitely when accessing a none access webpage from custom admin
profile.
386285 GUI Wizard fails to create FortiClient Dialup IPsec VPN if HA is enabled.
386849 When editing IPsec tunnel, Accessible Networks field cannot load if there is nested
address group.
395711 pyfcgid takes 100% of CPU when managed switch page displayed.
401247 Cannot nest service group within another service group through GUI.
409104 Fix virtual-wire wildcard VLANs not handling u-turn traffic properly.
HA
Bug ID Description
386434 HA configuration and VLAN interface disappear from config after reboot.
23 Release Notes
Fortinet, Inc.
Resolved Issues
Bug ID Description
396938 Reboot of FGT HA cluster member with redundant HA management interface deletes HA
configuration.
404736 SCTP synchronized sessions in HA cluster, when one reboots the master, the traffic is
interrupted.
404874 Some commands for HA in diag debug report and exec tac report need to be
updated.
408167 Heartbeat packets broadcast out of ports not configured as HB ports, even though the HB
ports are directly connected.
IPsec VPN
Bug ID Description
356330 Cross NP6-Chip IPsec traffic does not work in SLBC environment.
374326 Accept type: Any peer ID may be unavailable when creating a IPsec dialup tunnel with a
pre-shared key and ikev1 in main mode.
386802 Unable to establish phase 2 when using address group/group object as quick mode
selectors.
395044 OSPF over IPsec IKEv2 with dialup tunnel does not work as for IKEv1.
397386 Slave worker blades attempt to establish site to site IPsec VPN tunnel.
412987 IPsec VPN certificate not validated against PKI users CN and Subject.
Bug ID Description
377255 Can't read UTM details on log panel when set location to FortiAnalyzer.
377733 Results/Deny All filter does not return all required/expected data.
Release Notes 24
Fortinet, Inc.
Resolved Issues
Bug ID Description
386742 Missing deny traffic log when user traffic is blocked by NAC quarantine.
401511 FortiGate Local Report showing incorrect Malware Victims and Malware Sources.
406071 DNS filtering shows error: all Fortiguard SDNS servers failed to respond.
421062 FortiGate 60E stopped sending logs to FortiAnalyzer when reliable enabled.
Router
Bug ID Description
374306 Number of concurrent sessions affect the convergence time after HA failover.
405408 FortiGate creates corrupted OSPF LS Update packet when certain number of networks is
propagated.
421151 ICMP redirect received in root affects another VDOMs route gateway selection.
25 Release Notes
Fortinet, Inc.
Resolved Issues
SSL VPN
Bug ID Description
370986 SSL VPN LDAP user password renew doesnt work when two factor authentication is
enabled.
375827 SSL VPN web mode get Access denied to FOS 5.4.1 GA B1064 under VDOM.
375894 SSL VPN web mode access FMG B1066/FAZ B1066 error.
389566 AltGr key does not work when connecting to RDP-TLS server through SSL VPN web portal
from IE 11.
394272 SSL VPN proxy mode can't proxy some web server URL normally.
396932 Some web sites not working over web SSL VPN.
399711 SSL VPN does not decode hostcheck string properly for latest FortiClient.
402743 User peer causes SSL VPN access failure even though user group has no user peer.
406028 Citrix with Xenapp 7.x not working via SSL VPN web portal.
408624 SSL VPN certificate UPN+LDAP authentication works only on first policy.
423452 Citrix Xenapp not working properly via SSL VPN web portal.
System
Bug ID Description
283952 VLAN interface Rx bytes statistics higher than underlying aggregate interface.
302722 Using CLI #get system hardware status makes CLI hang.
306041 SSH error Broken pipe on client when using remote forwarding and SSH deep packet
option log port fwd is enabled.
Release Notes 26
Fortinet, Inc.
Resolved Issues
Bug ID Description
355256 After reassigning a hardware switch to a TP-mode VDOM, bridge table does not learn MAC
addresses until after a reboot.
376423 Sniffer is not able to capture ICMPv6 packets with Hop-by-Hop option when using filter
icmp6.
377192 DHCP request after lease expires is sent with former unicast IP instead of 0.0.0.0 as source.
382657 ICMP Packets bigger than 1418 bytes are dropped when offloading for IPsec tunnel is
enabled.
Affected models: FG-30D, FG-60D, FG-70D, FG-90D, FG-90D-POE, FG-94D, FG-98D,
FG-200D, FG-200D-POE, FG-240D, FG-240D-POE, FG-280D-POE, FWF-30D, FWF-60D,
FWF-90D, FWF-90D-POE.
383126 50E/51E TP mode - STP BPDU forwarding destined to 01:80:c2:00:00:00 has stopped after
warm/cold reboot.
386271 On FWF-90D after enabling IPS sensor with custom sig, in 60% chance need to wait for 30+
seconds to let ping packet pass.
386395 Missing admin name in system event log related to admin NAC quarantine.
27 Release Notes
Fortinet, Inc.
Resolved Issues
Bug ID Description
393275 VDOM admin forced change password while there is other login session gets The name is a
reserved keyword by the system.
394775 GUI not behaving properly after successful upload of FTK200CD file.
395039 Loopback interface: Debug Flow and logs do not show the usage of firewall policy ID.
396018 Backup slave member of a redundant interface accept and process incoming traffic.
397984 SLBC - FIB sync may fail if there is a large routing table update.
398852 UDP jumbo frames arrives fragmented on a 3600C are blocked when acceleration is
enabled.
399364 VDOM config restore fails for GRE interface bound to IPsec VPN interface.
399648 LAN ports status is up after reboot even if administrative status is down on FG-30D.
400907 Ethernet Ports Activity LED doesnt light for shared copper ports.
401360 LDAP group query failed when the fixed length buffer overflows.
403532 FG-100D respond fragmented ICMP request with non-fragmented reply right after factory
reset.
403724 Real number of FortiToken supported doesn't match tablesize on some platforms.
404258 L2TP second user cannot connect to FG-600D via a router (NAPT).
405234 Unable to load application control replacement message logo and image in explicit proxy
(HTTPS).
405757 Interface link not coming up when FortiGate interface is set to 1000full.
406071 DNS Filtering showing error all Fortiguard SDNS servers failed to
respond.
Release Notes 28
Fortinet, Inc.
Resolved Issues
Bug ID Description
406519 Administrative users assigned to prof_admin profile do not have access to diagnose CLI
command.
406972 Device become unresponsive for 30 min. during IPS update when cfg-save option is set
to manual.
409828 Cisco switches dont discover FortiGate using LLDP on internalX ports.
410463 SNMP is not responding when queried on a loopback IP address with an asymmetric SNMP
packet path.
410901 PKI peer CA search stops on first match based on CA subject name.
411685 If IPPool is enabled in the firewall policy, offloaded traffic to NP6 is encrypted with a wrong
SPI.
414243 DNS Filter local FortiGuard SDNS servers failed to respond due to malformed packet.
418205 High CPU utilization after upgrade from FortiOS 5.2.10 to 5.4.4.
420170 Skip the rating for dynamic DNS update type queries.
Web Filter
Bug ID Description
188128 For the Flowbase web filter, the CLI command set https-replacemsg disable
does not work.
WebProxy
Bug ID Description
376808 Explicit proxy PAC File distribution in FortiOS 5.4.x not working properly.
29 Release Notes
Fortinet, Inc.
Resolved Issues
Bug ID Description
402778 WAD does not authorize user if it belongs to more than 256 usergroups with Kerberos
authentication.
408503 Cannot access websites when SSL Inspection is set to Inspect All Ports with Proxy Option
enabled only for HTTP(ANY).
412462 Fortinet-Bar does not show up on iPhone with iOS 10.2.1 Safari and Google Chrome
57.0.2987.100.
415918 Explicit proxy users are disconnected once a VDOM is created / removed.
WiFi
Bug ID Description
FortiOS 5.4.5 is no longer vulnerable to the following CVE references. For more information, see
https://fortiguard.com/psirt.
374501 l CVE-2016-0723
421739 l CVE-2017-7734
l CVE-2017-7735
Release Notes 30
Fortinet, Inc.
Known Issues
The following issues have been identified in version 5.4.5. For inquires about a particular bug or to report a bug,
please contact Customer Service & Support.
AntiVirus
Bug ID Description
374969 FortiSandbox FortiView may not correctly parse the FSA v2.21 tracer file(.json).
Endpoint Control
Bug ID Description
374855 Third party compliance may not be reported if FortiClient has no AV feature.
375149 FortiGate does not auto update AV signature version while Endpoint Control is enabled.
391537 Buffer size is too small when sending large vulnerability list to FortiGate.
Firewall
Bug ID Description
FortiGate-3815D
Bug ID Description
FortiRugged-60D
Bug ID Description
375246 invalid hbdev dmz may be received if the default hbdev is used.
FortiSwitch-Controller/FortiLink
Bug ID Description
304199 Using HA with FortiLink can encounter traffic loss during failover.
31 Release Notes
Fortinet, Inc.
Known Issues
Bug ID Description
369099 FortiSwitch authorizes successfully but fails to pass traffic until you reboot FortiSwitch.
374346 Adding or reducing stacking connections may block traffic for 20 seconds.
FortiView
Bug ID Description
372350 Threat view: Threat Type and Event information is missing in the last level of the threat
view.
372897 Invalid -4 and invalid 254 is shown as the submitted file status.
373142 Threat: Filter result may not be correct when adding a filter on a threat and threat type on
the first level.
375172 FortiGate under a FortiSwitch may be shown directly connected to an upstream FortiGate.
375187 Using realtime auto update may increase chrome browser memory usage.
GUI
Bug ID Description
289297 Threat map may not be fully displayed when screen resolution is not big enough.
297832 Administrator with read-write permission for Firewall Configuration is not able to read or
write firewall policies.
355388 The Select window for remote server in remote user group may not work as expected.
365223 CSF: downstream FGT may be shown twice when it uses hardware switch to connect
upstream.
365317 Unable to add new AD group in second FSSO local polling agent.
365378 You may not be able to assign ha-mgmt-interface IP address in the same subnet as
another port from the GUI.
368069 Cannot select wan-load-balance or members for incoming interface of IPsec tunnel.
369155 There is no Archived Data tab for email attachment in the DLP log detail page.
Release Notes 32
Fortinet, Inc.
Known Issues
Bug ID Description
372908 The interface tooltip keeps loading the VLAN interface when its physical interface is in
another VDOM.
372943 Explicit proxy policy may show a blank for default authentication method.
374081 wan-load-balance interface may be shown in the address associated interface list.
374162 GUI may show the modem status as Active in the Monitor page after setting the
modem to disable.
374224 The Ominiselect widget and Tooltip keep loading when clicking a newly created object in
the Firewall Policy page.
374320 Editing a user from the Policy list page may redirect to an empty user edit page.
374322 Interfaces page may display the wrong MAC Address for the hardware switch.
374373 Policy View: Filter bar may display the IPv4 policy name for the IPv6 policy.
374397 Should only list any as destination interface when creating an explicit proxy in the TP
VDOM.
374525 When activating the FortiCloud/Register-FortiGate, clicking OK may not work the first time.
375346 You may not be able to download the application control packet capture from the forward
traffic log.
373546 Only 50 security logs may be displayed in the Log Details pane when more than 50 are
triggered.
374363 Selecting Connect to CLI from managed FAP context menu may not connect to FortiAP.
375036 The Archived Data in the Sniffer Traffic log may not display detailed content and download.
375227 You may be able to open the dropdown box and add new profiles even though errors occur
when editing a Firewall Policy page.
375259 Addrgrp editing page receives a js error if addrgrp contains another group object.
375383 Policy list page may receive a js error when clicking the search box if the policy includes
wan-load-balanceinterface.
33 Release Notes
Fortinet, Inc.
Known Issues
Bug ID Description
HA
Bug ID Description
399115 ID for the new policy (when using edit 0) is different on master and on slave unit.
IPsec
Bug ID Description
393958 Shellshock attack succeeds when FGT is configured with server-cert-mode replace
and an attacker uses rsa_3des_sha.
435124 Cannot establish IPsec phase1 tunnel after upgrading from version 5.4.5 to 5.6.0.
Workaround: After upgrading to 5.6.0, reconfigure all IPsec phase1 psksecret settings.
Router
Bug ID Description
299490 During and after failover, some multicast groups take up to 480 seconds to recover.
SSL VPN
Bug ID Description
304528 SSL VPN Web Mode PKI user might immediately log back in even after logging out.
374644 SSL VPN tunnel mode Fortinet bar may not be displayed.
375137 SSL VPN bookmarks may be accessible after accessing more than ten bookmarks in web
mode.
382223 SMB/CIFS bookmark in SSL VPN portal doesnt work with DFS Microsoft file server error
Invalid HTTP request.
Release Notes 34
Fortinet, Inc.
Known Issues
System
Bug ID Description
284512 When using the Dashboard Interface History widget, the httpds process uses excessive
memory and then crashes.
364280 User cannot use ssh-dss algorithm to log in to FortiGate via SSH.
371320 show system interface may not show the Port list in sequential order.
Upgrade
Bug ID Description
289491 When upgrading from 5.2.x to 5.4.0, port-pair configuration may be lost if the port-pair
name exceeds 12 characters.
Visibility
Bug ID Description
374138 FortiGate device with VIP configured may be put under Router/NAT devices because of an
address change.
VM
Bug ID Description
35 Release Notes
Fortinet, Inc.
Known Issues
WiFi
Bug ID Description
434991 WTP tablesize limitation cause WTP entry to be lost after upgrade from v5.4.4 to 5.4.5.
Affected models: FG-30D, FG-30D-POE, FG-30E, FWF-30D, FWF-30D-POE, FWF-30E.
Release Notes 36
Fortinet, Inc.
Limitations
When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may
arise when using the QCOW2 format and existing HDA issues.
37 Release Notes
Fortinet, Inc.
Copyright 2017 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet,
Inc., in the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company
names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and
actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein
represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written
contract, signed by Fortinets General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified
performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For
absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any
commitment related to future deliverables, features or development, and circumstances may change such that any forward-looking statements herein are not accurate.
Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify,
transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.