FGT
FGT
FGT
Version 6.0.5
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com
FORTINET BLOG
https://blog.fortinet.com
NSE INSTITUTE
https://training.fortinet.com
FORTIGUARD CENTER
https://fortiguard.com/
FEEDBACK
Email: techdoc@fortinet.com
Change Log 4
Introduction 5
Supported models 5
Special branch supported models 6
Special Notices 7
WAN optimization and web caching functions 7
FortiGuard Security Rating Service 7
Built-in certificate 8
FortiGate and FortiWiFi-92D hardware limitation 9
FG-900D and FG-1000D 9
FortiClient (Mac OS X) SSL VPN requirements 9
FortiClient profile changes 10
Use of dedicated management interfaces (mgmt1 and mgmt2) 10
Using FortiAnalyzer units running older versions 10
Upgrade Information 11
Fortinet Security Fabric upgrade 11
Minimum version of TLS services automatically changed 11
Downgrading to previous firmware versions 12
Amazon AWS enhanced networking compatibility issue 12
FortiGate VM firmware 13
Firmware image checksums 13
FortiGuard update-server-location setting 14
Product Integration and Support 15
Language support 17
SSL VPN support 17
SSL VPN standalone client 17
SSL VPN web mode 18
SSL VPN host compatibility list 18
Resolved Issues 20
Known Issues 30
Limitations 33
Citrix XenServer limitations 33
Open source XenServer limitations 33
This document provides the following information for FortiOS 6.0.5 build 0268:
l Special Notices
l Upgrade Information
l Product Integration and Support
l Resolved Issues
l Known Issues
l Limitations
For FortiOS documentation, see the Fortinet Document Library.
Supported models
FortiOS Carrier FortiOS Carrier 6.0.5 images are delivered upon request and are not available on the
customer support firmware download page.
The following models are released on a special branch of FortiOS 6.0.5. To confirm that you are running the correct
build, run the CLI command get system status and check that the Branch point field shows 0268.
WAN optimization and web caching functions are removed from 60D and 90D series platforms, starting from 6.0.0 due
to their limited disk size. Platforms affected are:
l FGT-60D
l FGT-60D-POE
l FWF-60D
l FWF-60D-POE
l FGT-90D
l FGT-90D-POE
l FWF-90D
l FWF-90D-POE
l FGT-94D-POE
Upon upgrading from 5.6 patches to 6.0.0, diagnose debug config-error-log read will show command
parse error about wanopt and webcache settings.
Not all FortiGate models can support running the FortiGuard Security Rating Service as a Fabric "root" device. The
following FortiGate platforms can run the FortiGuard Security Rating Service when added to an existing Fortinet
Security Fabric managed by a supported FortiGate model:
l FGR-30D-A
l FGR-30D
l FGR-35D
l FGR-60D
l FGR-90D
l FGT-200D
l FGT-200D-POE
l FGT-240D
l FGT-240D-POE
l FGT-280D-POE
l FGT-30D
l FGT-30D-POE
l FGT-30E
l FGT-30E-MI
l FGT-30E-MN
l FGT-50E
l FGT-51E
l FGT-52E
l FGT-60D
l FGT-60D-POE
l FGT-70D
l FGT-70D-POE
l FGT-90D
l FGT-90D-POE
l FGT-94D-POE
l FGT-98D-POE
l FWF-30D
l FWF-30D-POE
l FWF-30E
l FWF-30E-MI
l FWF-30E-MN
l FWF-50E-2R
l FWF-50E
l FWF-51E
l FWF-60D
l FWF-60D-POE
l FWF-90D
l FWF-90D-POE
l FWF-92D
Built-in certificate
FortiGate and FortiWiFi D-series and above have a built in Fortinet_Factory certificate that uses a 2048-bit certificate
with the 14 DH group.
FortiOS 5.4.0 reported an issue with the FG-92D model in the Special Notices > FG-92D High Availability in Interface
Mode section of the release notes. Those issues, which were related to the use of port 1 through 14, include:
l PPPoE failing, HA failing to form.
l IPv6 packets being dropped.
l FortiSwitch devices failing to be discovered.
l Spanning tree loops may result depending on the network topology.
FG-92D and FWF-92D do not support STP. These issues have been improved in FortiOS 5.4.1, but with some side
effects with the introduction of a new command, which is enabled by default:
config global
set hw-switch-ether-filter <enable | disable>
l ARP (0x0806), IPv4 (0x0800), and VLAN (0x8100) packets are allowed.
l BPDUs are dropped and therefore no STP loop results.
l PPPoE packets are dropped.
l IPv6 packets are dropped.
l FortiSwitch devices are not discovered.
l HA may fail to form depending the network topology.
l All packet types are allowed, but depending on the network topology, an STP loop may result.
CAPWAP traffic will not offload if the ingress and egress traffic ports are on different NP6 chips. It will only offload if
both ingress and egress ports belong to the same NP6 chip.
When using SSL VPN on Mac OS X 10.8, you must enable SSLv3 in FortiOS.
With introduction of the Fortinet Security Fabric, FortiClient profiles will be updated on FortiGate. FortiClient profiles
and FortiGate are now primarily used for Endpoint Compliance, and FortiClient Enterprise Management Server (EMS) is
now used for FortiClient deployment and provisioning.
The FortiClient profile on FortiGate is for FortiClient features related to compliance, such as Antivirus, Web Filter,
Vulnerability Scan, and Application Firewall. You may set the Non-Compliance Action setting to Block or Warn.
FortiClient users can change their features locally to meet the FortiGate compliance criteria. You can also use
FortiClient EMS to centrally provision endpoints. The EMS also includes support for additional features, such as VPN
tunnels or other advanced options. For more information, see the FortiOS Handbook – Security Profiles.
For optimum stability, use management ports (mgmt1 and mgmt2) for management traffic only. Do not use
management ports for general user traffic.
When using FortiOS 6.0.5 with FortiAnalyzer units running 5.6.5 or lower, or 6.0.0-6.0.2, FortiAnalyzer might report
increased bandwidth and session counts if there are sessions that last longer than two minutes.
For accurate bandwidth and session counts, upgrade the FortiAnalyzer unit to 6.0.5.
Supported upgrade path information is available on the Fortinet Customer Service & Support site.
1. Go to https://support.fortinet.com.
2. From the Download menu, select Firmware Images.
3. Check that Select Product is FortiGate.
4. Click the Upgrade Path tab and select the following:
l Current Product
l Current FortiOS Version
l Upgrade To FortiOS Version
5. Click Go.
FortiOS 6.0.5 greatly increases the interoperability between other Fortinet products. This includes:
l FortiAnalyzer 6.0.0 and later
l FortiClient 6.0.0 and later
l FortiClient EMS 6.0.0 and later
l FortiAP 5.4.4 and later
l FortiSwitch 3.6.4 and later
Upgrade the firmware of each product in the correct order. This maintains network connectivity without the need to use
manual steps.
Before upgrading any product, you must read the FortiOS Security Fabric Upgrade Guide.
If Security Fabric is enabled, then all FortiGate devices must be upgraded to 6.0.5. When
Security Fabric is enabled, you cannot have some FortiGate devices running 6.0.5 and some
running 5.6.x.
For improved security, FortiOS 6.0.5 uses the ssl-min-proto-version option (under config system
global) to control the minimum SSL protocol version used in communication between FortiGate and third-party SSL
and TLS services.
When you upgrade to FortiOS 6.0.5 and later, the default ssl-min-proto-version option is TLS v1.2. The
following SSL and TLS services inherit global settings to use TLS v1.2 as the default. You can override these settings.
l Email server (config system email-server)
l Certificate (config vpn certificate setting)
l FortiSandbox (config system fortisandbox)
l FortiGuard (config log fortiguard setting)
l FortiAnalyzer (config log fortianalyzer setting)
l LDAP server (config user ldap)
l POP3 server (config user pop3)
Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings are
retained:
l operation mode
l interface IP/management IP
l static route table
l DNS settings
l VDOM parameters/settings
l admin user account
l session helpers
l system access profiles
If you have long VDOM names, you must shorten the long VDOM names (maximum 11 characters) before
downgrading:
1. Back up your configuration.
2. In the backup configuration, replace all long VDOM names with its corresponding short VDOM name.
For example, replace edit <long_vdom_name>/<short_name> with edit <short_name>/<short_
name>.
3. Restore the configuration.
4. Perform the downgrade.
With this new enhancement, there is a compatibility issue with older AWS VM versions. After downgrading a 6.0.5
image to an older version, network connectivity is lost. Since AWS does not provide console access, you cannot recover
the downgraded image.
When downgrading from 6.0.5 to older versions, running the enhanced nic driver is not allowed. The following AWS
instances are affected:
l C3
l C4
l R3
l I2
l M4
l D2
FortiGate VM firmware
Fortinet provides FortiGate VM firmware images for the following virtual environments:
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.OpenXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
the QCOW2 file for Open Source XenServer.
l .out.CitrixXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.
Linux KVM
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.kvm.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
QCOW2 that can be used by qemu.
Microsoft Hyper-V
l .out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .out.hyperv.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
three folders that can be imported by Hyper-V Manager on Hyper-V 2012. It also contains the file fortios.vhd in
the Virtual Hard Disks folder that can be manually added to the Hyper-V Manager.
l .out: Download either the 64-bit firmware image to upgrade your existing FortiGate VM installation.
l .ovf.zip: Download either the 64-bit package for a new FortiGate VM installation. This package contains Open
Virtualization Format (OVF) files for VMware and two Virtual Machine Disk Format (VMDK) files used by the OVF
file during deployment.
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support
portal, https://support.fortinet.com. After logging in select Download > Firmware Image Checksums, enter the image
file name including the extension, and select Get Checksum Code.
The FortiGuard update-server-location default setting is different between hardware platforms and VMs. On
hardware platforms, the default is any. On VMs, the default is usa.
On VMs, after upgrading from 5.6.3 or earlier to 5.6.4 or later (including 6.0.0 or later), update-server-location
is set to usa.
If necessary, set update-server-location to use the nearest or low-latency FDS servers.
The following table lists FortiOS 6.0.5 product integration and support information:
FortiManager See important compatibility information in . For the latest information, see
FortiManager compatibility with FortiOS in the Fortinet Document Library.
Upgrade FortiManager before upgrading FortiGate.
FortiAnalyzer See important compatibility information in . For the latest information, see
FortiAnalyzer compatibility with FortiOS in the Fortinet Document Library.
Upgrade FortiAnalyzer before upgrading FortiGate.
FortiClient: l 6.0.0
l Microsoft Windows See important compatibility information in Fortinet Security Fabric upgrade on
l Mac OS X page 11.
l Linux
If you're upgrading both FortiOS and FortiClient from 5.6 to 6.0, upgrade
FortiClient first to avoid compatibility issues.
FortiClient for Linux is supported on Ubuntu 16.04 and later, Red Hat 7.4 and
later, and CentOS 7.4 and later.
If you are using FortiClient only for IPsec VPN or SSL VPN, FortiClient version
5.6.0 and later are supported.
Fortinet Single Sign-On l 5.0 build 0276 and later (needed for FSSO agent support OU in group filters)
(FSSO) l Windows Server 2016 Datacenter
l Windows Server 2016 Standard
l Windows Server 2008 (32-bit and 64-bit)
l Windows Server 2008 R2 64-bit
l Windows Server 2012 Standard
l Windows Server 2012 R2 Standard
l Novell eDirectory 8.8
AV Engine l 6.00019
Virtualization Environments
Microsoft l Hyper-V Server 2008 R2, 2012, 2012 R2, and 2016
Language support
Language support
Language GUI
English ✔
Chinese (Simplified) ✔
Chinese (Traditional) ✔
French ✔
Japanese ✔
Korean ✔
Portuguese (Brazil) ✔
Spanish ✔
The following table lists SSL VPN tunnel client standalone installer for the following operating systems.
Linux CentOS 6.5 / 7 (32-bit & 64-bit) 2336. Download from the Fortinet Developer Network:
Linux Ubuntu 16.04 (32-bit & 64-bit) https://fndn.fortinet.net.
Other operating systems may function correctly, but are not supported by Fortinet.
SSL VPN standalone client no longer supports the following operating systems:
l Microsoft Windows 7 (32-bit & 64-bit)
l Microsoft Windows 8 / 8.1 (32-bit & 64-bit)
l Microsoft Windows 10 (64-bit)
l Virtual Desktop for Microsoft Windows 7 SP1 (32-bit)
The following table lists the operating systems and web browsers supported by SSL VPN web mode.
Linux Ubuntu 16.04 / 18.04 (32-bit & 64-bit) Mozilla Firefox version 66
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
The following table lists the antivirus and firewall client software packages that are supported.
The following issues have been fixed in version 6.0.5. For inquires about a particular bug, please contact Customer
Service & Support.
Antivirus
Bug ID Description
530210 Content Disarm cleans file even when it what was flagged Clean in FortiSandbox.
Bug ID Description
518146 DLP incorrectly blocking .deb file extension (DLP log unclear for matches in archive files).
524910 DLP profile to block the file name pattern "*" not blocking uploaded files.
DNS Filter
Bug ID Description
Endpoint Control
Bug ID Description
525179 FortiGate fails to assign FortiClient Compliance profile based on LDAP group membership.
Firewall
Bug ID Description
525995 Session marked dirty when routing table update for route which is not related to the session.
Bug ID Description
526748 Firewall policies with action DENY show Default proxy-options applied in GUI.
536868 A FortiGate in TP mode with set send-deny-packet enabled policy, generates strange ICMP-
REPLY for TCP SYN/ICMP-REQUEST/UD.
FOC
Bug ID Description
536520 GTP Tunnel States are not synced on subordinate unit after a reboot.
FortiView
Bug ID Description
521497 The FortiView All Sessions real time view is missing right-click menu to end session/ban ip.
527775 FortiView logs entries do not refresh on log drill down page.
527952 FortiView > WiFi Clients > drill down > Sessions gets nothing at final drill down if device
identification is disabled.
528684 FortiView > Bubble Chart cannot drill down on Firefox 63 with ReferenceError: "event is not
defined".
528744 FortiView > Traffic Shaping displays data with error message if switched from other pages in
custom period.
529313 FortiView > Web Sites > Web Categories drill down displays all entries in Policies tab.
529558 System Events widget shows No matching entries found when drilling down HA event.
538873 Traffic shaper info missing under Shaper column in FortiView.
GUI
Bug ID Description
473148 FGT5001D Sessions widget in Dashboard show negative % for nTurbo after throughput test.
477493 GUI fails to read correct Last Used time for firewall policy.
479482 Timeout does not work properly if user moves away from FortiGate GUI.
493704 While accessing FortiGate page, browser memory usage keeps spiking and finally PC hangs.
Bug ID Description
509791 Editing Address Objects name within SSL-SSH inspection profile selection pane cause loss of
Address/Web exemption objects.
521253 LAG interface is not listed on the dropdown list when configuring DNS Service.
536841 DNS server in VPN SSL setting is overwritten when SSL-VPN settings are modified via GUI.
HA
Bug ID Description
494900 Interface faceplate on System > HA shows inconsistent port link status with interface faceplate on
Network > Interface.
513940 Enormous amount of session between heartbeat Interfaces for port 703 (HASYNC).
516234 GUI checksums show slave is not synchronized when the master is synchronized.
529274 Factory reset box faild to sync with master in multi-VDOM upgraded from 6.0.3.
541224 Network loop over virtual-wire-pair in HA mode if running diagnose sys ha reset-uptime.
Intrusion Prevention
Bug ID Description
452131 ipsengine up time on FG-51E is a negative number after changing db from extended to regular.
476219 Delay for BFD in IPinIP traffic hitting policy with IPS while IPsec calculates new key.
525398 Disabled and enabled IPS Signatures looks the same in IPS Sensor GUI.
IPsec VPN
Bug ID Description
514519 OSPF neighbor can't up because IPsec tunnel interface MTU keeps changing.
518063 DPD shows unnegotiated and is not functioning correctly on ADVPN Spoke.
537140 KEv2 EAP - FortiGate fails to respond to IKE_AUTH when ECDSA certificate is used by ForitGate.
537450 Site-to-site VPN policy based - with DDNS destination fail to connect.
537769 FortiGate sends failure response to L2TP CHAP authentication attempt before checking it against
RADIUS server.
Bug ID Description
387324 Archive mark is always on under UTM logs page when log-display location set to FAZ.
528786 In Log viewer, forward traffic filter Result Accept(all)/Deny(all) does not work.
Proxy
Bug ID Description
491675 FTP Server is not accessible when AV profile is set to proxy based inspection.
512936 SSL certificate inspection in proxy mode doesn't use CN from Valid Certificate for categorization
when SNI is not present.
525518 Skype call drops when handled by WAD process after around three sec of being answered.
526667 FortiGate doesn't forward request:port command after 0 byte file transmission.
531575 Web site access failure due to OCSP check in WAD + Deep SSL inspection.
532121 WAD uses high CPU with "netlink recvmsg No buffer space available" after upgrade to 6.0.3+.
539452 FortiGate does not follow Authority key identifier when sending certificate chain in deep inspection.
Bug ID Description
545964 FortiManager sends requests to FortiGate to collect proxy policy hit_count/bytes, and the response
from FortiGate misses the uuid attribute.
REST API
Bug ID Description
523902 REST API issue: Access Token only verifies the first 30 characters.
Routing
Bug ID Description
526008 Differences between routing table and kernel forward information. ADVPN + BGP.
529683 Upgrade from 5.6 to 6.0 causes all routes to be advertised in BGP.
531947 SD WAN IPsec interfaces keep failing over when link selection strategy is set to Custom-profile.
533018 Process nsm with high CPU when displaying the GUI section of IP4 and IPv6 policy when receiving
full routing of BGP.
546198 SD-WAN performance SLA via GRE-Tunnel fails to set options or connect ping6 socket for monitor.
Security Fabric
Bug ID Description
525790 Not able to connect through SSL VPN to addresses resolved by SDN dynamic objects.
SSL VPN
Bug ID Description
493127 Connection to web server freezes when using SSL VPN web bookmark.
515370 SSL VPN access denied if address object added after group object in firewall policy.
517859 Unable to load web page for some internal web sites in SSL VPN web mode.
518406 Unable to load WebPage through SSL VPN webmode. Some js files of xunta internal web sites
have problems.
519113 SSL VPN web mode SMB connection doesn't work when enable then disable SMBCD debug.
522987 Backup and restore the VDOM config with SSL VPN settings causes some critical flags and counter
for SSL VPN to not update so SSL VPN stops working.
523450 Unable to access internal website via bookmark in SSL VPN web mode.
523647 Search result gives empty output upon accessing the URL https://ieeexplore.ieee.org via SSL VPN
bookmark.
523717 Dropdown list can not get expanded through bookmarks (SSL VPN).
525375 Atlassian Confluence wiki Javascript problem via SSL VPN web mode.
527348 JavaScript script is not available when connecting using SSL VPN web mode.
527476 Update from web mode fails for SharePoint page using MS NLB.
528289 SSL VPN crashes when it receives HTTP request with header "X-Forwarded-For" because of the
wrong use of sslvpn_ap_pstrcat.
529186 Problem loading reaching internal web server through SSL VPN Web bookmark when using
HTTPS. Some js files of "srvdnsmgt" do not run correctly.
529512 SSL VPN user gets disconnected when load-balance-mode is measured-volume-based in SD-WAN.
530223 SSL VPN wants client certificate even when no client-cert for realm is configured.
530833 Synology NAS login page stuck after login when accessing by SSL VPN Web portal.
533008 SSL web mode is not modifying links on certain web pages.
536058 Redirected port is not entered in the URL through SSL VPN web mode.
Bug ID Description
Switch Controller
Bug ID Description
530237 HA cluster out-of-sync after changing port POE mode on switch-controller managed-switch
settings: Double commit.
System
Bug ID Description
370151 CPU doesn't remove dirty flag when returns session back to NP6.
466805 Adding USB Host devices to a virtual machine connected by USB to FortiGate 500D causes the
units to restart in loop.
479533 skippingBad tar header message flooding on console after rebooting box and retrieving
logs.
493128 bcm.user always takes nearly 70% CPU after running Nturbo over IPsec script.
496934 New feature merge: DNS Domain List.
510973 FortiGate with disk and send logs to FAZ has PCI alerts.
511018 SSH/SSL VPN connection to external VLAN interface drop by changing unrelated interface IP or
restart OSPF.
513419 High CPU on some cores of CPU & packet drops around 2-3%.
525813 FortiGate managed by FortiManager intermittently going offline after rebooting FortiGate.
Bug ID Description
527390 Kernel panic in the HA cluster with FortiGate-3800D units running FortiOS v6.0.0 build 0200
527902 TXT records are truncated in DNS replies, when FortiGate is used as DNS server.
531584 Kernel Panic when Fragmented Multicast Traffic received on EMAC-VLAN interface.
534757 Device 80D reboots every 2-3 days with a kernel panic error.
538304 Aggregate interface (four member) flapps when the third member interface goes down.
539090 Modifying FortiGate administrator password to complex ones via SSH triggers a FortiManager
password change by auto-update.
Upgrade
Bug ID Description
498396 Upgrade from 5.2.13 to 5.4.9 is affected by application list global limit.
Bug ID Description
517702 VPN certificate CA: shows newly added entry before reboot but not after.
525648 FortiOS does not prompt for token when Access-Challenge is received - RADIUS authentication
fails.
525929 LDAPS requests fail with fnbamd stop error "Not enough bytes". LDAP works fine. Additional
timeout observed.
Bug ID Description
529945 Local certificate content changes should be directly applied for the admin-server-cert sent to the
client browser.
535279 FortiGate sends error user password to RADIUS server for CMCC auth user sometimes.
VM
Bug ID Description
526471 VMX: Adding a security group with ~30+ devices into the redirection policy the connection starts to
experience huge delay.
542794 Session size overflow on VMX causing timeout and error on NSX vMotion task.
WCCP
Bug ID Description
Web Filter
Bug ID Description
509860 Regex case insensitivity flag is ignored in 5.6.5 and 6.0.2 when FortiGate is in proxy mode.
531101 Web Filter inspection proxy mode unable to resolve hostname because website is unrated.
541539 URL filter wildcard expression not matched correctly on proxy mode.
WiFi Controller
Bug ID Description
516067 CAPWAP traffic from non-VLAN SSID is blocked when dtls-policy=ipsec-vpn and NP6
offload are enabled.
537848 FortiGate IPsec VPN phase1-interface and phase2-interface configurations are not saved into
configuration file.
The following issues have been identified in version 6.0.5. For inquires about a particular bug or to report a bug, please
contact Customer Service & Support.
Application Control
Bug ID Description
435951 Traffic keeps going through the DENY NGFW policy configured with URL category.
Firewall
Bug ID Description
546145 If the firewall policy includes a nonexistent ISDB ID on updated ISDB version, the firewall policy is
not read and reflected.
554806 Deleted policy entry on interface pair view doesn't disappear until refresh page.
FortiView
Bug ID Description
403229 In FortiView, display from FortiAnalyzer, the upstream FortiGate cannot drill down to final level for
downstream traffic.
411368 In FortiView with FortiAnalyzer, the combined MAC address is displayed in the Device field.
525702 FortiView does not support auto update in real-time view and shows unscanned application.
527540 In many FortiView pages, the Quarantine Host option is not clickable on a registered device.
528483 FortiView > Destination page filter destination owner cannot filter out correct destination in real
time view.
528767 In FortiView > multiple charts, Previous Time Periods in custom period is missing.
554791 Policy direct hyperlink from historical FortiView sessions does not highlight policy.
GUI
Bug ID Description
442231 Link cannot show different colors based on link usage legend in logical topology real time view.
Bug ID Description
HA
Bug ID Description
479987 FG MGMT1 does not authenticate Admin RADIUS users through primary unit (secondary unit
works).
539155 HA master does not send SNMP trap when plugging cable into interface that is set as ha-mgmt-
interfaces.
Intrusion Prevention
Bug ID Description
445113 IPS engine 3.428 on FortiGate sometimes cannot detect Psiphon packets that iscan can detect.
IPsec VPN
Bug ID Description
469798 The interface shaping with egress shaping profile doesn't work for offloaded traffic.
481201 The OCVPN feature is delayed about one day after registering on FortiCare.
Bug ID Description
412649 In NGFW Policy mode, FortiGate does not create web filter logs.
SSL VPN
Bug ID Description
554821 SSL VPN web mode to FortiGate 6.2 and 6.0.4 has display problem.
Switch Controller
Bug ID Description
System
Bug ID Description
472843 When FortiManager is set for DM = set verify-install-disable, FortiGate does not
always save script changes.
Upgrade
Bug ID Description
470575 After upgrading from 5.6.3, g-sniffer-profile and sniffer-profile exist for IPS and
web filter.
473075 When upgrading, multicast policies are lost when there is a zone member as interface.
481408 When upgrading from 5.6.3 to 6.0.0, the IPv6 policy is lost if there is SD-WAN member as
interface.
494217 Peer user SSL VPN personal bookmarks do not show when upgrade to 6.0.1.
Workaround: Use CLI to rename the user bookmark to the new name.
When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may arise
when using the QCOW2 format and existing HDA issues.