Fortios v7.2.4 Release Notes

Download as pdf or txt
Download as pdf or txt
You are on page 1of 75

Release Notes

FortiOS 7.2.4
FORTINET DOCUMENT LIBRARY
https://docs.fortinet.com

FORTINET VIDEO LIBRARY


https://video.fortinet.com

FORTINET BLOG
https://blog.fortinet.com

CUSTOMER SERVICE & SUPPORT


https://support.fortinet.com

FORTINET TRAINING & CERTIFICATION PROGRAM


https://www.fortinet.com/training-certification

FORTINET TRAINING INSTITUTE


https://training.fortinet.com

FORTIGUARD LABS
https://www.fortiguard.com

END USER LICENSE AGREEMENT


https://www.fortinet.com/doc/legal/EULA.pdf

FEEDBACK
Email: techdoc@fortinet.com

October 2, 2024
FortiOS 7.2.4 Release Notes
01-724-846881-20241002
TABLE OF CONTENTS

Change Log 6
Introduction and supported models 9
Supported models 9
Special notices 10
IPsec phase 1 interface type cannot be changed after it is configured 10
IP pools and VIPs are not considered local addresses for certain FortiOS versions 10
Support for FortiGates with NP7 processors and hyperscale firewall features 10
Changes in CLI 11
Changes in GUI behavior 13
Changes in default behavior 14
Changes in default values 15
Changes in table size 16
New features or enhancements 17
Upgrade information 30
Fortinet Security Fabric upgrade 30
Downgrading to previous firmware versions 31
Firmware image checksums 32
Strong cryptographic cipher requirements for FortiAP 32
FortiGate VM VDOM licenses 32
VDOM link and policy configuration is lost after upgrading if VDOM and VDOM link have
the same name 32
GUI firmware upgrade does not respect upgrade path 33
Product integration and support 34
Virtualization environments 35
Language support 35
SSL VPN support 36
SSL VPN web mode 36
Resolved issues 37
Anti Spam 37
Anti Virus 37
Application Control 37
Data Leak Prevention 38
Endpoint Control 38
Explicit Proxy 38
Firewall 38
FortiView 40
GUI 40
HA 42
Hyperscale 43
ICAP 44

FortiOS 7.2.4 Release Notes 3


Fortinet Inc.
Intrusion Prevention 44
IPsec VPN 44
Log & Report 46
Proxy 47
REST API 48
Routing 49
Security Fabric 50
SSL VPN 51
Switch Controller 53
System 53
Upgrade 57
User & Authentication 57
VM 58
Web Application Firewall 59
Web Filter 59
WiFi Controller 59
ZTNA 60
Common Vulnerabilities and Exposures 61
Known issues 63
Anti Spam 63
Anti Virus 63
Explicit Proxy 63
Firewall 64
GUI 65
HA 66
Hyperscale 66
IPsec VPN 66
Log & Report 67
Remote Access 67
Routing 67
Security Fabric 68
SSL VPN 68
Switch Controller 69
System 69
Upgrade 70
User & Authentication 70
VM 70
Web Filter 71
WiFi Controller 71
Built-in AV Engine 72
Built-in IPS Engine 73
Limitations 74
Citrix XenServer limitations 74

FortiOS 7.2.4 Release Notes 4


Fortinet Inc.
Open source XenServer limitations 74

FortiOS 7.2.4 Release Notes 5


Fortinet Inc.
Change Log

Date Change Description

2023-01-31 Initial release.

2023-02-01 Updated New features or enhancements on page 17, Resolved issues on page 37, and Known
issues on page 63.

2023-02-02 Updated Product integration and support on page 34.

2023-02-06 Updated Resolved issues on page 37 and Known issues on page 63.

2023-02-07 Updated Changes in default behavior on page 14, Fortinet Security Fabric upgrade on page 30,
Resolved issues on page 37, and Known issues on page 63.

2023-02-09 Updated Resolved issues on page 37

2023-02-16 Updated Resolved issues on page 37

2023-02-21 Updated Resolved issues on page 37 and Known issues on page 63.

2023-02-22 Updated Known issues on page 63.

2023-03-06 Updated Fortinet Security Fabric upgrade on page 30, Resolved issues on page 37, and Known
issues on page 63.

2023-03-07 Updated Resolved issues on page 37

2023-03-08 Updated Resolved issues on page 37 and Known issues on page 63.

2023-03-14 Updated Resolved issues on page 37 and Known issues on page 63.

2023-03-20 Updated Resolved issues on page 37 and Known issues on page 63.

2023-03-24 Updated Product integration and support on page 34, Resolved issues on page 37, and Known
issues on page 63.
Added VDOM link and policy configuration is lost after upgrading if VDOM and VDOM link have
the same name on page 32.

2023-04-03 Updated Changes in default behavior on page 14, Resolved issues on page 37, and Known
issues on page 63.

2023-04-11 Updated Resolved issues on page 37 and Known issues on page 63.

2023-04-17 Updated Known issues on page 63.

2023-05-01 Updated Changes in default behavior on page 14, Resolved issues on page 37, and Known
issues on page 63.

2023-05-04 Updated Resolved issues on page 37 and Known issues on page 63.

2023-05-15 Updated Product integration and support on page 34, Resolved issues on page 37, and Known
issues on page 63.

FortiOS 7.2.4 Release Notes 6


Fortinet Inc.
Change Log

Date Change Description

2023-05-23 Updated Resolved issues on page 37 and Known issues on page 63.

2023-05-29 Updated Resolved issues on page 37 and Known issues on page 63.

2023-06-12 Updated Resolved issues on page 37 and Known issues on page 63.
Added IP pools and VIPs are not considered local addresses for certain FortiOS versions on
page 10.

2023-06-13 Updated Resolved issues on page 37.

2023-06-26 Updated Resolved issues on page 37 and Known issues on page 63.

2023-07-10 Updated Known issues on page 63.

2023-07-24 Updated Known issues on page 63.

2023-08-02 Updated Resolved issues on page 37.

2023-08-08 Updated New features or enhancements on page 17, Resolved issues on page 37, and Known
issues on page 63.

2023-08-11 Updated Resolved issues on page 37.

2023-08-22 Updated Resolved issues on page 37 and Known issues on page 63.

2023-08-24 Updated Product integration and support on page 34.

2023-09-06 Updated Known issues on page 63, Built-in AV Engine on page 72, and Built-in IPS Engine on
page 73.

2023-10-04 Updated Resolved issues on page 37 and Known issues on page 63.

2023-10-16 Updated IP pools and VIPs are not considered local addresses for certain FortiOS versions on
page 10.

2023-10-20 Updated Resolved issues on page 37.

2023-11-02 Updated Known issues on page 63.

2023-11-15 Updated Resolved issues on page 37.

2023-11-27 Updated New features or enhancements on page 17 and Known issues on page 63.

2023-12-13 Updated Known issues on page 63.

2024-01-23 Updated Known issues on page 63.

2024-02-09 Updated New features or enhancements on page 17.

2024-02-13 Updated IP pools and VIPs are not considered local addresses for certain FortiOS versions on
page 10.

2024-02-20 Updated Known issues on page 63.

2024-03-06 Updated Known issues on page 63.

2024-04-01 Added GUI firmware upgrade does not respect upgrade path on page 33.

FortiOS 7.2.4 Release Notes 7


Fortinet Inc.
Change Log

Date Change Description

2024-04-18 Updated Known issues on page 63.

2024-04-29 Updated Known issues on page 63.

2024-05-14 Updated Known issues on page 63.

2024-06-11 Updated Resolved issues on page 37.

2024-06-25 Updated Known issues on page 63.

2024-07-10 Updated Known issues on page 63.

2024-08-07 Updated Known issues on page 63.

2024-08-21 Updated Resolved issues on page 37.

2024-09-05 Updated Known issues on page 63.

2024-10-02 Updated Resolved issues on page 37.

FortiOS 7.2.4 Release Notes 8


Fortinet Inc.
Introduction and supported models

This guide provides release information for FortiOS 7.2.4 build 1396.
For FortiOS documentation, see the Fortinet Document Library.

Supported models

FortiOS 7.2.4 supports the following models.

FortiGate FG-40F, FG-40F-3G4G, FG-60E, FG-60E-DSL, FG-60E-DSLJ, FG-60E-POE, FG-60F, FG-


61E, FG-61F, FG-80E, FG-80E-POE, FG-80F, FG-80F-BP, FG-80F-POE, FG-81E, FG-81E-
POE, FG-81F, FG-81F-POE, FG-90E, FG-91E, FG-100E, FG-100EF, FG-100F, FG-101E,
FG-101F, FG-140E, FG-140E-POE, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-
301E, FG-400E, FG-400E-BP, FG-401E, FG-500E, FG-501E, FG-600E, FG-601E, FG-800D,
FG-900D, FG-1000D, FG-1100E, FG-1101E, FG-1500D, FG-1500DT, FG-1800F, FG-1801F,
FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG-2600F, FG-2601F, FG-3000D, FG-3100D,
FG-3200D, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E,
FG-3601E, FG-3700D, FG-3960E, FG-3980E, FG-4200F, FG-4201F, FG-4400F, FG-4401F,
FG-5001E, FG-5001E1

FortiWiFi FWF-40F, FWF-40F-3G4G, FWF-60E, FWF-60E-DSL, FWF-60E-DSLJ, FWF-60F, FWF-


61E, FWF-61F, FWF-80F-2R, FWF-81F-2R, FWF-81F-2R-POE, FWF-81F-2R-3G4G-POE

FortiGate Rugged FGR-60F, FGR-60F-3G4G

FortiFirewall FFW-3980E, FFW-VM64, FFW-VM64-KVM

FortiGate VM FG-ARM64-AWS, FG-ARM64-AZURE, FG-ARM64-GCP, FG-ARM64-KVM, FG-ARM64-


OCI, FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG-VM64-GCP, FG-
VM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG-VM64-OPC, FG-VM64-RAXONDEMAND,
FG-VM64-SVM, FG-VM64-VMX, FG-VM64-XEN

Pay-as-you-go FOS-VM64, FOS-VM64-HV, FOS-VM64-KVM, FOS-VM64-XEN


images

FortiOS 7.2.4 Release Notes 9


Fortinet Inc.
Special notices

l IPsec phase 1 interface type cannot be changed after it is configured on page 10


l IP pools and VIPs are not considered local addresses for certain FortiOS versions on page 10
l Support for FortiGates with NP7 processors and hyperscale firewall features on page 10

IPsec phase 1 interface type cannot be changed after it is


configured

In FortiOS 7.2.0 and later, the IPsec phase 1 interface type cannot be changed after it is configured. This is due to the
tunnel ID parameter (tun_id), which is used to match routes to IPsec tunnels to forward traffic. If the IPsec phase 1
interface type needs to be changed, a new interface must be configured.

IP pools and VIPs are not considered local addresses for certain
FortiOS versions

For FortiOS 6.4.9 and later, 7.0.1 to 7.0.12, 7.2.0 to 7.2.5, and 7.4.0, all IP addresses used as IP pools and VIPs are not
considered local IP addresses if responding to ARP requests on these external IP addresses is enabled (set arp-
reply enable, by default). For these cases, the FortiGate is not considered a destination for those IP addresses and
cannot receive reply traffic at the application layer without special handling.
l This behavior affects FortiOS features in the application layer that use an IP pool as its source IP pool, including
SSL VPN web mode, explicit web proxy, and the phase 1 local gateway in an interface mode IPsec VPN.
l The FortiGate will not receive reply traffic at the application layer, and the corresponding FortiOS feature will not
work as desired.
l Configuring an IP pool as the source NAT IP address in a regular firewall policy works as before.
For details on the history of the behavior changes for IP pools and VIPs, and for issues and their workarounds for the
affected FortiOS versions, see Technical Tip: IP pool and virtual IP behavior changes in FortiOS 6.4, 7.0, 7.2, and 7.4.

Support for FortiGates with NP7 processors and hyperscale firewall


features

FortiOS 7.2.4 includes main branch support for FortiGates with NP7 processors (FG-1800F, FG-1801F, FG-2600F, FG-
2601F, FG-3500F, FG-3501F, FG-4200F, FG-4201F, FG-4400F, and FG-4401F). These FortiGates can also be
licensed for hyperscale firewall features.
For more information, refer to the Hyperscale Firewall Release Notes.

FortiOS 7.2.4 Release Notes 10


Fortinet Inc.
Changes in CLI

Bug ID Description

729063 Change ZTNA firewall vip6 option from arp-reply to ndp-reply.


config firewall vip6
edit "test"
set mappedip <IPv6_address>
set ndp-reply {enable | disable}
next
end

751715 Add command that allows users to switch between high-speed modem (USB 2.0, option 0) and
super-speed modem (USB 3.0, option 1) operation mode.
# execute lte-modem set-usb-mode {0 | 1}

775793 Add shaping-stats option under config system npu to enable/disable NP7 traffic shaping
statistics.
config system npu
set shaping-stats {enable | disable}
end

785866 Add command to collect FortiLink-related data in the FortiGate debug report.
# diagnose debug fortilink-report {all | switch-id | switch-group}

796366 Add syslog-affinity option to set the CPU mask for syslogd and its child process.
config system global
set syslog-affinity <string>
end

797620 Add cert-probe-failure option to allow/block the SSL-SSH profile deep inspection based on
the certificate probe failure.
config firewall ssl-ssh-profile
edit <name>
config ssl
set inspect-all deep-inspection
set cert-probe-failure {allow | block}
end
next
end

815333 Add option for the unknown ESP packets detection feature (default = enable).
config system settings
set detect-unknown-esp {enable | disable}
end

FortiOS 7.2.4 Release Notes 11


Fortinet Inc.
Changes in CLI

Bug ID Description

818061 Add diagnostic command to show the statistics of the SD-WAN peer' remote health checks.
# diagnose system sdwan health-check remote <name> <seq_num>

823811 Add srcaddr6/dstaddr6 negate option in security policy configuration.


config firewall security-policy
set dstaddr6-negate {enable | disable}
set srcaddr6-negate {enable | disable}
end

825479 Add restart option in the execute federated-upgrade command, which adds the ability to
fail the multi-version upgrade in the event of a syntax error during the upgrade, and allows users to
restart the currently configured upgrade through the CLI.

826036 Move unknown-content-encoding option from antivirus profile to firewall


profile-protocol-options.
config firewall profile-protocol-options
edit <name>
config http
set unknown-content-encoding {block | inspect | bypass}
end
next
end

836650 Add interface-subnet-usage option under config system global to enable/disable interface
subnet usage.
config system global
set interface-subnet-usage {disable | enable}
end

FortiOS 7.2.4 Release Notes 12


Fortinet Inc.
Changes in GUI behavior

Bug ID Description

780311 The DLP profile is re-introduced in the GUI on the Security Profiles > Data Leak Prevention page.
Users can configure DLP settings within the Profiles, Sensors, and Dictionaries tabs. DLP profiles
can be added to proxy-based firewall policies and proxy policies. DLP profiles cannot be added to
flow-based firewall policies and one-arm sniffers.

805233 The new Log & Report > Reports page consolidates FortiAnalyzer, FortiGate Cloud, and Local
reports into a tab-based menu. The new Log & Report > Log Settings page consolidates the Global
Settings, Local Logs, and Threat Weight settings into a tab-based menu.

FortiOS 7.2.4 Release Notes 13


Fortinet Inc.
Changes in default behavior

Bug ID Description

780568 Introduce CLI/WAD learn check for the same url-map among HTTPS, TCP forwarding, and
SAML SP API gateway entities.
Before this change, the same url-map was allowed with different services. After this change, API
gateway with the same url-map are not allowed under the same host (including empty vhosts).
If there is already a certain url-map configured in previous API gateways, under a certain vhost,
then no more API gateways with the same url-map can be added under the same vhost. Users will
get an error message stating this action is not allowed.

798427 The following enhancements have been added to the Top FortiSandbox Files FortiView monitor:
l PDF reports are downloaded on-demand. By default, only 10 are kept in memory.

l PDFs are deleted from memory after 24 hours.

819937 For new firewall policies with a deny action, set match-vip is enabled by default. When
upgrading from a previous version, existing policy settings for match-vip are preserved.

829458 Remove the allow-quic option from the options setting under config application list.
The QUIC option is also removed from the Application Sensor configuration page in the GUI. Since
HTTP3 over QUIC is fully supported by FortiOS, blocking QUIC by default in the application control
profile is no longer necessary.

829544 Remove the maintainer account (which allowed users to log in through the console after a hard
reboot). Users who lose their password must have physical access to the FortiGate and perform a
TFTP restore of the firmware in order to regain access to the FortiGate.

837048 In the following scenarios, creating a matching address object for an interface is enabled
automatically and cannot be disabled:
l When creating a new interface with the LAN role.

l When an interface role is changed from a non-LAN role to a LAN role.

Once the address object is created, it cannot be deleted unless the interface role is changed to a
non-LAN role.

FortiOS 7.2.4 Release Notes 14


Fortinet Inc.
Changes in default values

Bug ID Description

798091 Add speed option for 1000M auto-negotiation for FG-110xE.

825537 Change voice-enterprise default value from disable to enable.

840537 Change the default value of the log-blocked-traffic attribute of firewall access-proxy
to be enabled.

FortiOS 7.2.4 Release Notes 15


Fortinet Inc.
Changes in table size

Bug ID Description

823373 Increase the number of VRFs per VDOM from 64 to 252.

823708 Increase the secondary IP limit from 32 to 256 addresses.

FortiOS 7.2.4 Release Notes 16


Fortinet Inc.
New features or enhancements

More detailed information is available in the New Features Guide.

Bug ID Description

596988 Support automatic vCPU hot add and hot remove to the limit of the license entitlements after
activating an S-series license or a FortiFlex license. This enhancement removes the requirement for
running the execute cpu add <integer> command or rebooting when the FortiGate VM has a
lower number of vCPUs allocated than the licensed number of vCPUs.

676463 The ISDB lookup penalty when revisiting the same resources can be circumvented by enabling the
software ISDB cache:
config system settings
set internet-service-database-cache {enable | disable}
end

727383 Add GUI support for IPv6 addresses in Internet Service Database (ISDB), and allow them to be
configured in firewall policies.

750073 The /api/v2/monitor/ips/session/performance REST API can be used to query the


FortiGate for its IPS session information.

753177 Display IoT devices with known vulnerabilities on the Security Fabric > Asset Identity Center page's
Asset list view. Hovering over the vulnerabilities count displays a View IoT Vulnerabilities tooltip,
which opens the View IoT Vulnerabilities table that includes the Vulnerability ID, Type, Severity,
Reference, Description, and Patch Signature ID. Each entry in the Reference column includes the
CVE number and a link to the CVE details.
The Security Fabric > Security Rating > Security Posture report includes FortiGuard IoT Detection
Subscription and FortiGuard IoT Vulnerability checks. The FortiGuard IoT Detection Subscription
rating check will pass if the System > FortiGuard page shows that the IoT Detection Service is
licensed. The FortiGuard IoT Vulnerability rating check will fail if any IoT vulnerabilities are found.
To detect IoT vulnerabilities, the FortiGate must have a valid IoT Detection Service license, device
detection must be configured on a LAN interface used by IoT devices, and a firewall policy with an
application control sensor must be configured.

763752 Add GUI support for ip6-delegated-prefix-iaid.

766646 Enhance the Security Fabric > Fabric Connectors page to show a high-level overview of the Fabric
components that are enabled and how they connect to each other. The System > Fabric
Management page can be used to register and authorize Security Fabric devices instead of the
using the Security Fabric network topology gutter, which has been removed from the Security
Fabric > Fabric Connectors page.
Changes include:
l Improve the Security Fabric configuration settings to select the Security Fabric role.

l Merge relevant connectors into Core Network Security Connectors and Security Fabric

Connectors sections.
l The Core Network Security Connectors section includes the Security Fabric Setup, LAN

FortiOS 7.2.4 Release Notes 17


Fortinet Inc.
New features or enhancements

Bug ID Description

Edge Devices, Logging & Analytics, and FortiClient EMS cards.


l The Security Fabric Connectors section includes the Central Management, Sandbox, and
Supported Connectors cards.

766811 Add support to allow the SSL VPN client to add source ranges for routing through an SSL interface.
config vpn ssl client
edit <name>
set ipv4-subnets <subnets>
set ipv6-subnets <subnets>
next
end

config vpn ssl web portal


edit <name>
set client-src-range {enable | disable}
set ip-mode {range | user-group | dhcp | no-ip}
next
end

767570 Add the Fabric Overlay Orchestrator, which is an easy-to-use GUI wizard within FortiOS that
simplifies the process of configuring a self-orchestrated SD-WAN overlay within a single Security
Fabric without requiring additional tools or licensing. Currently, the Fabric Overlay Orchestrator
supports a single hub architecture and builds upon an existing Security Fabric configuration. This
feature configures the root FortiGate as the SD-WAN overlay hub and configures the downstream
FortiGates (first-level children) as the spokes. After configuring the Fabric Overlay, you can proceed
to complete the SD-WAN deployment configuration by configuring SD-WAN rules.

768062 Add support to use FortiMonitor to detect link quality based on sending probes from behind the
FortiGate for selected applications to measure additional values, such as network transmit time
(NTT), server response time (SRT), and application errors (app_err).
config system sdwan
config health-check
edit <name>
set detect-mode agent-based
next
end
config service
edit <id>
set agent-exclusive {enable | disable}
next
end
end

768458 Add the ability to perform multi-processing for the wireless daemon (cw_acd) by allowing users to
specify the acd-process-count. The count varies by model based on the number of FortiAPs it is
allowed to manage.
config wireless-controller global

FortiOS 7.2.4 Release Notes 18


Fortinet Inc.
New features or enhancements

Bug ID Description
set acd-process-count <integer>
end

768966 Before this enhancement, certificate-based authentication against Active Directory LDAP (AD
LDAP) only supported the UserPrincipleName (UPN) as the unique identifier in the Subject
Alternative Name (SAN) field in peer user certificates. This enhancement extends the use case to
cover the RFC 822 Name (corporate email address) defined in the SAN extension of the certificate
to contain the unique identifier used to match a user in AD LDAP. It also allows the DNS defined in
the user certificate to be used as a unique identifier.

773551 The antivirus (AV) exempt list allows users to exempt known safe files that happen to be incorrectly
classified as malicious by our AV signature and AV engine scan. By configuring an antivirus exempt
list in the CLI, users can specify file hashes in MD5, SHA1, or SHA256 for matching, When
matched, the FortiGate ignores the AV scan verdict so that the corresponding UTM behavior
defined in the AV profile is not performed. The exempt list does not apply to results of outbreak
prevention, machine learning, FortiNDR, or FortiSandbox inline scans.

774766 Add server-cert and server-ca-cert options for Symantec Endpoint Protection Manager
(SEPM) SDN connectors, which allow users to specify a certificate or series of certificates for the
FortiGate to trust when connecting to the SEPM server.
config system sdn-connector
edit <name>
set server-cert <remote_certificate>
set server-ca-cert <remote_or_CA_certificate>
next
end

780571 Add Logs Sent Daily chart for remote logging sources (FortiAnalyzer, FortiGate Cloud, and
FortiAnalyzer Cloud) to the Logging & Analytics Fabric Connector card within the Security Fabric >
Fabric Connectors page and to the Dashboard as a widget for a selected remote logging source.

795829 Allow virtual patching to be applied to traffic destined to the FortiGate by applying IPS signatures to
the local in interface using local in policies. Attacks geared towards GUI and SSH management
access, for example, can be mitigated using IPS signatures pushed from FortiGuard, thereby
virtually patching these vulnerabilities.
config firewall local-in-policy
edit <id>
set virtual-patch {enable | disable}
next
end

801495 Allow device statistics (bytes and packets) to be displayed on FortiGate when a FortiSwitch NAC
policy is enabled. Statistics are collected per device/MAC address connected to FortiSwitch.
# diagnose switch-controller telemetry show mac-stats switch <serial_
number>

802001 Add command to clean up old configurations, except for serial number and FortiManager IP, in
system.central-management.

FortiOS 7.2.4 Release Notes 19


Fortinet Inc.
New features or enhancements

Bug ID Description
# execute factoryreset-for-central-management

804870 Add support to source the packets with the address of the client-facing interface instead of using the
server-facing interface’s address.
config system interface
edit <name>
config ipv6
set dhcp6-relay-source-interface {enable | disable}
end
next
end

805565 Add the gui-proxy-inspection setting under config system settings, which is enabled
on most models except for entry-level platforms with 2 GB of RAM or less. When this setting is
disabled:
l Proxy-based only profiles such as ICAP, Web Application Firewall, Video Filter, and Zero Trust

Network Access are disabled (grayed out) on the System > Feature Visibility page.
l The Feature set field is disabled on UTM profiles. Only flow-based features are shown.
l Firewall policy pages do not have option to select a Flow-based or Proxy-based inspection
mode.
l Proxy-based UTM profiles cannot be selected within policy configurations or other areas.
Note the following exceptions:
l If the proxy feature set is enabled from the CLI or carried over from upgrading, it can be

displayed in the GUI.


l If proxy-based inspection mode is enabled from the CLI or carried over from upgrading, it can
be displayed in GUI firewall policy pages.

805867 Increase the number of supported NAC devices to 48 times the maximum number of FortiSwitch
units supported on that FortiGate model.

FortiOS 7.2.4 Release Notes 20


Fortinet Inc.
New features or enhancements

Bug ID Description

806993 Support ZTNA policy access control of unmanageable and unknown devices in the ZTNA
application gateway by using the EMS_ALL_UNMANAGEABLE_CLIENTS and EMS_ALL_UNKNOWN_
CLIENTS dynamic address local tags, respectively.
Enhance diagnostic commands:
l Use diagnose firewall dynamic address to view IP addresses of clients associated
with EMS_ALL_UNMANAGEABLE_CLIENTS and EMS_ALL_UNKNOWN_CLIENTS dynamic
addresses.
l Use diagnose user-device-store device memory list to view tags of devices
identified through FortiGate device detection.
Enhance ZTNA traffic logs:
l The emsconnection (CLI) or EMS Connection (GUI) field is used for the client connection
status with EMS server; possible values of unknown, offline, or online.
l The clientdevicemanageable (CLI) or Client Device Manageable (GUI) field is used for
device manageability status.
In the GUI, tags can be specified in proxy policies (Policy & Objects > ZTNA > ZTNA Rules), and
tags are visible on various pages (Policy & Objects > ZTNA > ZTNA Tags, Dashboard > FortiClient
widget, and Security Fabric > Asset Identity Center).

812120 Support non-English keyboards for SSL VPN web mode with VNC by adding the vnc-keyboard-
layout option for config bookmarks under vpn ssl web portal, vpn ssl web user-
bookmark, and vpn ssl web user-group-bookmark. The server and client must have the
same keyboard layout.
The available options are: default, da (Danish), nl (Dutch), en-uk (English, United Kingdom),
en-uk-ext (English, United Kingdom Extended), fi (Finnish), fr (French), fr-be (French,
Belgium), fr-ca-mul (French, Canadian multilingual standard), de (German), de-ch (German,
Switzerland), it (Italian), it-142 (Italian 142), pt (Portuguese), pt-br-abnt2 (Portuguese
Brazilian ABNT2), no (Norwegian), gd (Scottish Gaelic), es (Spanish), sv (Swedish), and us-intl
(United States international).

812993 Support the blocking of a discovered FortiExtender device on a FortiGate configured as a


FortiExtender controller using Reject Status in the GUI and set authorized disable in the
CLI.
config extension-controller extender
edit <name>
set id <string>
set authorized disable
next
end

813333 Allow configuration of interface-select-method and source-ip for TACACS+ accounting


servers.

814796 Remove the threat level threshold option from compromised host automation triggers in the GUI
and CLI.

FortiOS 7.2.4 Release Notes 21


Fortinet Inc.
New features or enhancements

Bug ID Description

818343 HTTP2 connection coalescing and concurrent multiplexing allows multiple HTTP2 requests to share
the same TLS connection when the destination IP is the same and host names are compatible in the
certificate. This is supported for ZTNA, virtual server load balancing, and explicit proxy.

819508 A FortiGate can allow single sign-on (SSO) from FortiCloud and FortiCloud IAM users with
administrator profiles inherited from FortiCloud or overridden locally by the FortiGate. Similarly,
users accessing the FortiGate remotely from FortiGate Cloud can have their permissions inherited
or overridden by the FortiGate.

819583 Add guards to Node.JS log generation and move logs to tmpfs to prevent conserve mode issues.
Node.JS logs only last a calendar day and will store up to 5 MB of logs. Once this limit is exceeded,
the log file is deleted and a new file is created. A delete option has been added to the Node.JS
debug command.
# diagnose nodejs logs {list | show <arg> | show-all | delete <arg>}

820902 Add option to exclude the first and last IP of a NAT64 IP pool. This setting is enabled by default.
config firewall ippool
edit <name>
set nat64 enable
set subnet-broadcast-in-ippool {enable | disable}
next
end

820989 Improve device identification of a router or proxy:


l Re-introduce the concept of router detection based on detecting the device type changing.

l Do not perform a signature check when scanning HTTP traffic if the headers contain Via,

Forwarded, X-Forwarded-For, X-Forwarded-Host, or X-Forwarded-Proto.


l Modify the rules for TTL-based router detection.

822249 Add DHCP relay parameters under config vpn ssl web portal so user groups can get
different scope IP addresses from the DHCP server.
config vpn ssl web portal
edit <name>
set dhcp-ra-giaddr <gateway_IP_address>
set dhcp6-ra-linkaddr <IPv6_link_address>
next
end

822423 Add option to support minimum and maximum version restrictions for the user agent.
config firewall proxy-address
edit <name>
set type {src-advanced | ua}
set ua <browser>
set ua-min-ver <string>
set ua-max-ver <string>
next
end

FortiOS 7.2.4 Release Notes 22


Fortinet Inc.
New features or enhancements

Bug ID Description

823374 BGP extended community route targets can be matched in route maps. This can be applied in a
scenario where the BGP route reflector receives routes from many VRFs, and instead of reflecting
all routes from all VRFs, users only want to reflect routes based on a specific extended community
route target.
config router extcommunity-list
edit <name>
set type {standard | expanded}
config rule
edit <id>
set action {deny | permit}
set type {rt | soo}
set match <extended_community_specifications>
set regexp <ordered_list_of_attributes>
next
end
next
end

config router route-map


edit <name>
config rule
edit <id>
set match-extcommunity <list>
set match-extcommunity-exact {enable | disable}
next
end
next
end

823702 Allow VLAN sub-interfaces, such as regular 802.1Q and 802.1ad (QinQ), to be members of a virtual
wire pair.

823709 Add TPM support for FG-VM64 platforms. Hypervisors with software TPM emulator packages
installed will be able to support the TPM feature on FortiOS. This is currently supported on KVM and
QEMU.

823917 Add option to set the IP fragment memory threshold manually (in MB, 32 - 2047, default = 32). A
large memory threshold can reduce the number of ReasmFails due to the large number of fragment
packets.
config system global
set ip-fragment-mem-thresholds <integer>
end

825139 Add option to embed a Base64 string instead of a plain text URL for images on the block pages.
config webfilter fortiguard
set embed-image {enable | disable}
end

FortiOS 7.2.4 Release Notes 23


Fortinet Inc.
New features or enhancements

Bug ID Description

825308 Allow FortiGate-VMs for OCI to work on ARM-based Oracle Cloud Ampere A1 Compute instances.

825951 Add the ability for Dynamic ARP Inspection (DAI) to examine ARP packets against static clients with
static IP-MAC binding. Configurations can be pushed by the FortiGate switch controller to managed
switches.
config switch-controller managed-switch
edit <serial_number>
config dhcp-snooping-static-client
edit <name>
set ip <IP_address>
set vlan <vlan_ID>
set mac <MAC_address>
set port <port>
next
end
next
end

827460 Allow users to specify cloud mode in the user data during deployment to insert a Cloud mode:
cnf identification in the get system status output. This allows FortiManager to detect the
managed FortiGate as a FortiGate-CNF device and disable certain settings.

829628 Add option for matching IPv4 mapped IPv6 URLs. This setting is disabled by default. When
enabled, if the URL filter entry's URL hostname is an IPv4 address, the URL filter list will build an
extra entry with the mapped IPv6 hostname URL This is the same URL as the original URL, except
that the hostname is replaced with the mapped IPv6 hostname.
config webfilter urlfilter
edit <id>
set ip4-mapped-ip6 {enable | disable}
next
end

830527 Added option to set the VRF route on a VPN interface with vpn-id-ipip encapsulation.
Previously, VRFs in static routes could only be set if the blackhole was enabled.
config router static
edit <seq-num>
set device "vpn1"
set vrf 1
next
end

BFD is skipped when the VPN interface uses vpn-id-ipip encapsulation.

FortiOS 7.2.4 Release Notes 24


Fortinet Inc.
New features or enhancements

Bug ID Description

831010 Support wireless client mode on FortiWiFi 80F series models. When wireless client mode is
successfully configured, a default static route to the aplink interface is automatically created. For
outgoing traffic using this wireless client connection, a firewall policy from the wired internal/LAN
interface as the source interface to the aplink interface as the destination interface must be
configured.

831427 Add log-single-cpu-high option under config system global. When enabled, CPU
single core usage will be polled every three seconds, and any single CPU core usage above the
CPU usage threshold will report an event log. If a core is reported, that core will not be checked
again for the next 30 seconds.
config system global
set log-single-cpu-high {enable | disable}
end

831492 Add support to allow individual FortiGates in the Security Fabric to have their own automation
setting.
config automation setting
set fabric-sync {enable | disable}
end

832041 Add options to filter WAD log messages by process type or process ID, and print WAD log
messages by default when the session is unknown.
# diagnose wad filter process-type <integer>

# diagnose wad filter process-id <integer>

When running diagnose wad filter list , the process type and process id are visible
in the output.

832435 Add support for PoE mode, power, and priority switch port options on FortiSwitch through the switch
controller for supported models.
config switch-controller managed-switch
edit <switch-id>
config ports
edit <name>
set poe-port-mode {ieee802-3af | ieee802-3at}
set poe-port-priority {critical-priority | high-priority |
low-priority}
set poe-port-power {normal | perpetual | perpetual-fast}
next
end
next
end

833111 Add option to enable or disable rewriting the Host field in HTTP requests through a virtual server or
access proxy before being sent to a real server.
config firewall vip

FortiOS 7.2.4 Release Notes 25


Fortinet Inc.
New features or enhancements

Bug ID Description
edit <vip>
set type server-load-balance
config realservers
edit <id>
set translate-host {enable | disable}
next
end
next
end

config firewall access-proxy


edit <name>
config api-gateway
edit <id>
config realservers
edit <id>
set translate-host {enable | disable}
next
end
next
end
next
end

834861 Add route tags to static routes.


config router static
edit <seq-num>
set tag <id>
next
end

Add password field to BGP neighbor group to be used for the neighbor range.
config router bgp
config neighbor-group
edit <name>
set password <password>
next
end
end

836287 Support adding YAML to the file name when backing up the config as YAML, and detecting file
format when restoring the configuration.
The execute restore yaml-config command has been removed and execute restore
config should be used.
In the GUI, the File format field has been removed from the Restore system Configuration page.

FortiOS 7.2.4 Release Notes 26


Fortinet Inc.
New features or enhancements

Bug ID Description

836613 Add option for each FortiClient EMS connector (trust-ca-cn). This option is enabled by default.
When enabled, the CA and CN information is stored with the connector, which allows the FortiGate
to automatically approve an updated certificate so long as it has the same CA and CN.
config endpoint-control fctems
edit <id>
set trust-ca-cn {enable | disable}
next
end

836653 On FortiGates licensed for hyperscale firewall features, the following diagnose commands display
summary information for IPv4 or IPv6 hardware sessions.
# diagnose sys npu-session list-brief

# diagnose sys npu-session list-brief6

836851 Enhance DHCP:


l Increase the number of supported IP ranges from 3 to 10

l Support DHCP option 77 for User Class information

l Support customizing the lease time per IP range (CLI only)

838363 Internet Service Database (ISDB) on-demand mode replaces the full-sized ISDB file with a much
smaller file that is downloaded onto the flash drive. This file contains only the essential entries for
Internet Services. When a service is used in a firewall policy, the FortiGate queries FortiGuard to
download the IP addresses and stores them on the flash drive. The FortiGate also queries the local
MAC Database (MADB) for corresponding MAC information.
config system global
set internet-service-database on-demand
end

839076 Support the IP addresses of AWS WorkSpaces, VPC endpoints, transit gateways, and the ENIs
associated with various AWS load balancers in the AWS SDN connector.
config system sdn-connector
edit <name>
set alt-resource-ip {enable | disable}
next
end

839877 FortiPolicy can be added to the Security Fabric. When FortiPolicy joins the Security Fabric and is
authorized in the Security Fabric widget, it appears in the Fabric topology pages. A FortiGate can
grant permission to FortiPolicy to perform firewall address and policy changes. Two security rating
tests for FortiPolicy have been added to the Security Posture scorecard.

839951 Add FGT-ARM64-GCP image to support ARM64-based GCP VMs of the GCP Tau T2A instance
family.

841928 In some scenarios where it is necessary to simulate a system crash, the following commands allow
a super_admin administrator to safely trigger a kernel crash using a SysRq key.
# diagnose debug kernel sysrq status

FortiOS 7.2.4 Release Notes 27


Fortinet Inc.
New features or enhancements

Bug ID Description
# diagnose debug kernel sysrq {enable | disable}

# diagnose debug kernel sysrq command crash

A kernel crash dump is outputted to the console. The FortiGate reboots and recovers without losing
any functionality. This is only supported on FortiGate VMs.

841934 Enhance the FortiGate AWS SDN connector to resolve various AWS endpoint ENI IP addresses:
l API Gateway private endpoints

l VPC endpoints for Aurora Data API

l AWS PrivateLink for S3

l VPC endpoints for Lamdba

This adds support for dynamic policies in FortiGate CNF, and to resolve various AWS PrivateLink
endpoints for dynamic policies in typical deployments.

844039 When WAN-LAN operation and LAN port options are configured on the FortiGate and FortiAP, the
FortiGate can display details about wired clients connected to the FortiAP LAN port in each of the
following cases:
l LAN2 port of FortiAP models with LAN1 and LAN2 ports

l LAN port of FortiAP models with LAN and WAN ports

The following configuration settings are required:


l WAN-LAN operation must be configured using set wan-port-mode wan-lan on the

FortiGate's FortiAP profile and cfg -a WANLAN_MODE=WAN-LAN using the FortiAP CLI,
respectively.
l LAN port mode can be configured using any of the port-mode options (nat-to-wan,

bridge-to-wan, bridge-to-ssid) under config lan within config wireless-


controller wtp-profile.
Details about wired clients are displayed in the FortiOS CLI using diagnose wireless-
controller wlac -c lan-sta, and in the FortiAP CLI using cw_diag -c k-lan-host.

849771 Support Shielded and Confidential VM modes on GCP where the UEFI VM image is used for secure
boot, and data in use is encrypted during processing.

855684 Allow users to configure the RADIUS NAS-ID as a custom ID or the hostname. When deploying a
wireless network with WPA-Enterprise and RADIUS authentication, or using the RADIUS MAC
authentication feature, the FortiGate can use the custom NAS-ID in its Access-Request.
config user radius
edit <name>
set nas-id-type {legacy | custom | hostname}
set nas-id <string>
next
end

858786 When configuring a CGN IP pool for a hyperscale firewall, exclude IP addresses within this IP pool
from being used for source NAT (excludeip). This allows users to remain secure and mitigate
attacks by ensuring that global IP addresses within a CGN IP pool that are being targeted by
external attackers are not re-used by other users of the hyperscale firewall.
config firewall ippool

FortiOS 7.2.4 Release Notes 28


Fortinet Inc.
New features or enhancements

Bug ID Description
edit <name>
set type cgn-resource-allocation
set startip <IPv4_address>
set endip <IPv4_address>
set excludeip <IPv4_address>, <IPv4_address>, <IPv4_address> ...
next
end

This option is currently not supported with a fixed allocation CGN IP pool (when set cgn-
fixedalloc enable is configured).

FortiOS 7.2.4 Release Notes 29


Fortinet Inc.
Upgrade information

Supported upgrade path information is available on the Fortinet Customer Service & Support site.

To view supported upgrade path information:

1. Go to https://support.fortinet.com.
2. From the Download menu, select Firmware Images.
3. Check that Select Product is FortiGate.
4. Click the Upgrade Path tab and select the following:
l Current Product

l Current FortiOS Version

l Upgrade To FortiOS Version

5. Click Go.

Fortinet Security Fabric upgrade

FortiOS 7.2.4 greatly increases the interoperability between other Fortinet products. This includes:

FortiAnalyzer l 7.2.2

FortiManager l 7.2.2

FortiExtender l 4.0.0 and later. For compatibility with latest features, use latest 7.0 version.

FortiSwitch OS l 6.4.6 build 0470 or later


(FortiLink support)

FortiAP l See Strong cryptographic cipher requirements for FortiAP on page 32


FortiAP-S
FortiAP-U
FortiAP-W2

FortiClient* EMS l 7.0.3 build 0229 or later

FortiClient* Microsoft l 7.0.3 build 0193 or later


Windows

FortiClient* Mac OS X l 7.0.3 build 0131 or later

FortiClient* Linux l 7.0.3 build 0137 or later

FortiClient* iOS l 7.0.2 build 0036 or later

FortiClient* Android l 7.0.2 build 0031 or later

FortiSandbox l 2.3.3 and later for post-transfer scanning


l 4.2.0 and later for post-transfer and inline scanning

FortiOS 7.2.4 Release Notes 30


Fortinet Inc.
Upgrade information

*
If you are using FortiClient only for IPsec VPN or SSL VPN, FortiClient version 6.0 and later are supported.
When upgrading your Security Fabric, devices that manage other devices should be upgraded first.

When using FortiClient with FortiAnalyzer, you should upgrade both to their latest versions.
The versions between the two products should match. For example, if using FortiAnalyzer
7.2.0, use FortiClient 7.2.0.

Upgrade the firmware of each device in the following order. This maintains network connectivity without the need to use
manual steps.
1. FortiAnalyzer
2. FortiManager
3. Managed FortiExtender devices
4. FortiGate devices
5. Managed FortiSwitch devices
6. Managed FortiAP devices
7. FortiClient EMS
8. FortiClient
9. FortiSandbox
10. FortiMail
11. FortiWeb
12. FortiNAC
13. FortiVoice
14. FortiDeceptor
15. FortiNDR
16. FortiTester
17. FortiMonitor
18. FortiPolicy

If Security Fabric is enabled, then all FortiGate devices must be upgraded to 7.2.4. When
Security Fabric is enabled in FortiOS 7.2.4, all FortiGate devices must be running FortiOS
7.2.4.

Downgrading to previous firmware versions

Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings are
retained:
l operation mode
l interface IP/management IP
l static route table
l DNS settings
l admin user account

FortiOS 7.2.4 Release Notes 31


Fortinet Inc.
Upgrade information

l session helpers
l system access profiles

Firmware image checksums

The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support
portal, https://support.fortinet.com. After logging in, go to Support > Firmware Image Checksums (in the Downloads
section), enter the image file name including the extension, and click Get Checksum Code.

Strong cryptographic cipher requirements for FortiAP

FortiOS 7.0.0 has removed 3DES and SHA1 from the list of strong cryptographic ciphers. To satisfy the cipher
requirement, current FortiAP models whose names end with letter E or F should be upgraded to the following firmware
versions:
l FortiAP (F models): version 6.4.3 and later
l FortiAP-S and FortiAP-W2 (E models): version 6.2.4, 6.4.1, and later
l FortiAP-U (EV and F models): version 6.0.3 and later
l FortiAP-C (FAP-C24JE): version 5.4.3 and later
If FortiGates running FortiOS 7.0.1 and later need to manage FortiAP models that cannot be upgraded or legacy FortiAP
models whose names end with the letters B, C, CR, or D, administrators can allow those FortiAPs' connections with
weak cipher encryption by using compatibility mode:
config wireless-controller global
set tunnel-mode compatible
end

FortiGate VM VDOM licenses

FortiGate VMs with one VDOM license (S-series, V-series, FortiFlex) have a maximum number or two VDOMs. An
administrative type root VDOM and another traffic type VDOM are allowed in 7.2.0 and later. After upgrading to 7.2.0 and
later, if the VM previously had split-task VDOMs enabled, two VDOMs are kept (the root VDOM is an administrative
type).

VDOM link and policy configuration is lost after upgrading if VDOM


and VDOM link have the same name

Affected versions:
l FortiOS 6.4.9 and later
l FortiOS 7.0.6 and later

FortiOS 7.2.4 Release Notes 32


Fortinet Inc.
Upgrade information

l FortiOS 7.2.0 and later


When upgrading to one of the affected versions, there is a check within the set vdom-links function that rejects vdom-
links that have the same name as a VDOM. Without the check, the FortiGate will have a kernel panic upon bootup
during the upgrade step.
A workaround is to rename the vdom-links prior to upgrading, so that they are different from the VDOMs.

GUI firmware upgrade does not respect upgrade path

When performing a firmware upgrade that requires multiple version jumps, the Follow upgrade path option in the GUI
does not respect the recommended upgrade path, and instead upgrades the firmware directly to the final version. This
can result in unexpected configuration loss. To upgrade a device in the GUI, upgrade to each interim version in the
upgrade path individually.
For example, when upgrading from 7.0.7 to 7.0.12 the recommended upgrade path is 7.0.7 -> 7.0.9 -> 7.0.11 -> 7.0.12.
To ensure that there is no configuration loss, first upgrade to 7.0.9, then 7.0.11, and then 7.0.12.

FortiOS 7.2.4 Release Notes 33


Fortinet Inc.
Product integration and support

The following table lists FortiOS 7.2.4 product integration and support information:

Web browsers l Microsoft Edge 111


l Mozilla Firefox version 111
l Google Chrome version 111

Other browser versions have not been tested, but may fully function.
Other web browsers may function correctly, but are not supported by Fortinet.

Explicit web proxy browser l Microsoft Edge 111


l Mozilla Firefox version 111
l Google Chrome version 111

Other browser versions have not been tested, but may fully function.
Other web browsers may function correctly, but are not supported by Fortinet.

FortiController l 5.2.5 and later


Supported models: FCTL-5103B, FCTL-5903C, FCTL-5913C

Fortinet Single Sign-On l 5.0 build 0308 and later (needed for FSSO agent support OU in group filters)
(FSSO) l Windows Server 2022 Standard
l Windows Server 2022 Datacenter
l Windows Server 2019 Standard
l Windows Server 2019 Datacenter
l Windows Server 2019 Core
l Windows Server 2016 Datacenter
l Windows Server 2016 Standard
l Windows Server 2016 Core
l Windows Server 2012 Standard
l Windows Server 2012 R2 Standard
l Windows Server 2012 Core
l Windows Server 2008 64-bit (requires Microsoft SHA2 support
package)
l Windows Server 2008 R2 64-bit (requires Microsoft SHA2 support
package)
l Windows Server 2008 Core (requires Microsoft SHA2 support package)
l Novell eDirectory 8.8

AV Engine l 6.00285

IPS Engine l 7.00255

FortiOS 7.2.4 Release Notes 34


Fortinet Inc.
Product integration and support

Virtualization environments

The following table lists hypervisors and recommended versions.

Hypervisor Recommended versions

Citrix Hypervisor l 8.1 Express Edition, Dec 17, 2019

Linux KVM l Ubuntu 18.0.4 LTS


l Red Hat Enterprise Linux release 8.4
l SUSE Linux Enterprise Server 12 SP3 release 12.3

Microsoft Windows Server l 2012R2 with Hyper-V role

Windows Hyper-V Server l 2019

Open source XenServer l Version 3.4.3


l Version 4.1 and later

VMware ESXi l Versions 6.5, 6.7, 7.0, and 8.0.

Language support

The following table lists language support information.

Language support

Language GUI

English ✔

Chinese (Simplified) ✔

Chinese (Traditional) ✔

French ✔

Japanese ✔

Korean ✔

Portuguese (Brazil) ✔

Spanish ✔

FortiOS 7.2.4 Release Notes 35


Fortinet Inc.
Product integration and support

SSL VPN support

SSL VPN web mode

The following table lists the operating systems and web browsers supported by SSL VPN web mode.

Supported operating systems and web browsers

Operating System Web Browser

Microsoft Windows 7 SP1 (32-bit & 64-bit) Mozilla Firefox version 105
Google Chrome version 109

Microsoft Windows 10 (64-bit) Microsoft Edge


Mozilla Firefox version 105
Google Chrome version 109

Ubuntu 20.04 (64-bit) Mozilla Firefox version 105


Google Chrome version 109

macOS Monterey 12.2 Apple Safari version 15


Mozilla Firefox version 98
Google Chrome version 99

iOS Apple Safari


Mozilla Firefox
Google Chrome

Android Mozilla Firefox


Google Chrome

Other operating systems and web browsers may function correctly, but are not supported by Fortinet.

FortiOS 7.2.4 Release Notes 36


Fortinet Inc.
Resolved issues

The following issues have been fixed in version 7.2.4. To inquire about a particular bug, please contact Customer
Service & Support.

Anti Spam

Bug ID Description

857911 The Anti-Spam Block/Allow List Entry dialog page is not showing the proper Type values in the
dropdown.

Anti Virus

Bug ID Description

727067 FortiGate should fix the interface between FortiGate and FortiAnalyzer for the CDR file.

794575 If FortiGate Cloud is selected as sandbox server under Security Fabric > Fabric Connectors, an anti
virus profile with settings to Send files to FortiSandbox for inspection does not get saved in the GUI.

800731 Flow AV sends HTML files to the FortiGate Cloud Sandbox every time when HTML is not configured
in file list.

818092 CDR archived files are deleted at random times and not retained.

823677 When a FortiGate with DLP patterns configured is connected to FortiSandbox, scanunit crashes
when the FortiSandbox extension reloads or worker shuts down.

845960 Flow mode opens port 8008 over the AV profile that does not have HTTP scan enabled.

849020 FortiGate may enter conserve mode while performing Content Disarm and Reconstruction (CDR)
parsing on certain MS Office documents with a .tmp extension.

Application Control

Bug ID Description

670627 When configuring an application group with Google Drive_File.Sharing or a category in a security
policy, there is no drop or warning message.

829458 Remove option to block QUIC by default.

FortiOS 7.2.4 Release Notes 37


Fortinet Inc.
Resolved issues

Data Leak Prevention

Bug ID Description

828621 DLP is not blocking files larger than the threshold value defined in set file-size.

872057 Incorrect count match when multiple DLP sensors are used in a single DLP profile leading to a false
positive block of files.

Endpoint Control

Bug ID Description

817140 Device is constantly unauthorized in EMS when using set interface-select-method


sdwan.

834168 FortiGates get deauthorized on EMS.

Explicit Proxy

Bug ID Description

744564 Expand web proxy header content string size from 256 to 512, then to 1024.

803228 When converting an explicit proxy session to SSL redirect, traffic may be interrupted inadvertently in
some situations.

805703 FortiGate does not load balance requests evenly when the ldb-method is set to least-
session.

823319 Authentication hard timeout is not respected for firewall users synchronized from WAD user.

866316 Explicit web proxy fails to forward HTTPS request to a Squid forward server when certificate
inspection is applied.

Firewall

Bug ID Description

631814 Static route configuration should not be shown on address dialog page if the address type is an IP
range.

FortiOS 7.2.4 Release Notes 38


Fortinet Inc.
Resolved issues

Bug ID Description

728734 The VIP group hit count in the table (Policy & Objects > Virtual IPs) is not reflecting the correct sum
of VIP members.

784766 When a FortiGate virtual server for Exchange incorrectly indicates to the Exchange server that it
does not support secure renegotiation when it should, the Exchange server terminates the
connection and returns an ERR_EMPTY_RESPONSE.

800730 When using NGFW policy-based mode, modifying a security policy causes all sessions to be reset.

808264 Stress test shows packet loss when testing with flow inspection mode and application control.

815333 Local-in policy does not deny IKE UDP 500/4500.

815565 Unable to connect to the reserved management interface allowed by the local-in policy.

823917 Packet loss occurs due to a high amount of fragment reassembly failures.

824091 Promethean Screen Share (multicast) is not working on the member interfaces of a software switch.

827397 When matching traffic result and no internet service is configured, lower singularity object result
may overwrite higher ones.

827780 ISDB source matching is inconsistent between transparent and NAT modes.

829071 Geolocation block on VIP object failed with seemly correct configuration.

829664 Kernel panic occurs while collecting the debug flow.

830823 Traffic is dropped intermittently by the implicit deny policy, even though there is a valid policy on the
FortiGate.

832063 The Clone Reverse option is missing when right-clicking on an entry on some policy pages.

832217 Traffic is hitting the implicit deny policy when changes are made to a policy.

833370 Need ability to add external resource as source address in a local-in policy.

834301 Session dropped with timeout action after policy changes.

835413 Inaccurate sFlow interface data reported to PRTG after upgrading to 7.0.

840689 Virtual server aborts connection when ssl-max-version is set to tls-1.3.

843274 Source interface filter (srcintf-filter) is not working with virtual servers.

847086 Unable to add additional MAC address objects in an address group that already has 152 MAC
address objects.

848058 NPD failed to parse zone in the source interface of a DoS/ACL policy and failed to offload.

852714 Making a full HTTP session is sometimes bypassed if ssl-hsts is enabled for a server-load-
balance VIP.

854107 NGFW VDOM incorrectly includes all interfaces belonging to the root VDOM on interface and policy
related GUI pages.

865661 Standard and full ISDB sizes are not configurable on FG-101F.

FortiOS 7.2.4 Release Notes 39


Fortinet Inc.
Resolved issues

FortiView

Bug ID Description

798427 Change the sandbox PDF report query to be on-demand.

838652 The FortiView Sessions monitor displays VDOM sessions from other VDOMs.

GUI

Bug ID Description

440197 On the System > FortiGuard page, the override FortiGuard server for AntiVirus & IPS Updates
shows an Unknown status, even if the server is working correctly. This is a display issue only; the
override feature is working properly.

712414 On the System > Fabric Management page, the registration status for FortiSwitches and FortiAPs
have a Failed to fetch status error.

719476 FortiLink NAC matched device is displayed in the CLI but not in the GUI under WiFi & Switch
Controller > NAC Policies > View Matched Devices.

722358 When a FortiGate local administrator is assigned to more than two VDOMs and tries logging in to
the GUI console, they get a command parse error when entering VDOM configuration mode.

729406 New IPsec design tunnel-id still displays the gateway as an IP address, when it should be a
tunnel ID.

749843 Bandwidth widget does not display traffic information for VLAN interfaces when a large number of
VLAN interfaces are configured.

780832 WiFi & Switch Controller > Managed FortiAPs list does not load if there is an invalid or unsupported
FortiAP configured.

794656 After rebooting, the Licenses widget shows an Unable to connect to FortiGuard
servers message for ten minutes.

794757 Inbound traffic on the interface bandwidth widget shows 0 bps on the VLAN interface.

804584 On the policy dialog page, the Select Entries box for the Service field does not list all service objects
if an IPv6 address is in the policy.

807197 High iowait CPU usage and memory consumption issues caused by report runner.

819272 When a VLAN belongs to a zone, and the zone is used in a policy, editing the VLAN ID changes the
policy's position in the table.

820909 On the Policy & Objects > Schedules page, when the end date of a one-time schedule is set to the
31st of a month, it gets reset to the 1st of the same month.
Workaround: use CLI to set schedules with an end date of 31st.

FortiOS 7.2.4 Release Notes 40


Fortinet Inc.
Resolved issues

Bug ID Description

821030 Security Fabric root FortiGate is unable to resolve firewall object conflicts in the GUI.

821734 Log & Report > Forward Traffic logs do not show the Policy ID if there is no Policy Name.

822991 On the Log & Report > Forward Traffic page, using the filter Result : Deny(all) does not work as
expected.

825377 Managed FortiSwitches page, policy pages, and some FortiView widgets are slow to load.

827893 Security rating test for FortiCare Support fails when connected to FortiManager Cloud or
FortiAnalyzer Cloud.

829313 The dropdown field for the IdP Certificate is empty when editing an SSO user configuration (User
& Authentication > Single Sign-On), even though the summary shows an IdP certificate.

829736 Incorrect information is being displayed for the HA role on the System > HA page.

829773 Unable to load the Network > SD-WAN > SD-WAN Rules table sometimes due to a JavaScript error.

831439 On the WiFi & Switch Controller > SSIDs page, multiple DHCP servers for the same range can be
configured on an interface if the interface name contains a comma (,) character.

831885 Unable to access GUI via HA management interface of secondary unit.

833306 Intermittent error, Failed to retrieve FortiView data, appears on real-time FortiView Sources and
FortiView Destination monitor pages.

833774 GUI needs to allow the members of the software switch interface to be used in IPv4/IPv6 multicast
policy.

835089 Unable to move SD-WAN rule ordering in the GUI (FortiOS 7.2.1).

837048 Unable to delete the LAN interface's addresses without switching it back to a none-LAN role.

837836 The Network > Interfaces faceplate shows two SFP interfaces, which do not exist on that FortiGate
model.

840604 When upgrading the FortiGate firmware upgrade from FortiGuard, update the API description text
for the file name.

842079 On the System > HA page, a Failed to retrieve info caution message appears when hovering over
the secondary unit's Hostname. The same issue is observed on the Dashboard > Status > Security
Fabric widget.

845513 On G-model profiles, changing the platform mode change from single 5G (dedicated scan enabled)
to dual 5G is not taking effect.

854529 The local standalone mode in a VAP configuration is disabled when viewing or updating its settings
in the GUI.

FortiOS 7.2.4 Release Notes 41


Fortinet Inc.
Resolved issues

HA

Bug ID Description

738728 The secondary unit tries to contact the forward server for sending the health check packets when
the healthcheck under web-proxy forward-server is enabled.

777394 Long-lasting sessions expire on the HA secondary in large session synchronization scenarios.

783500 IPsec phase 2 is down because the connection expired due to RFC 6311 HA recovery failure.

788702 Due to an HA port (Intel i40e) driver issue, not all SW sessions are synchronized to the secondary,
so there is a difference.

813207 Virtual MAC address is sent inside GARP by the secondary unit after a reboot.

819872 HA split brain scenario occurs after upgrading from 6.4.6 to 7.0.6, and HA heartbeats are lost
followed by a kernel panic. Affected platforms: NP7 models.

823687 A cluster is repeatedly out-of sync due to external files (SSLVPN_AUTH_GROUPS) when there are
frequent user logins and logouts.

824200 HA is out-of-sync due to SD-WAN default configuration for a newly created VDOM.

824651 Certificate upload causes HA checksum mismatch.

826188 Secondary FortiGate FQDN is stuck in the queue, even if the primary FortiGate FQDN has already
been resolved.

829390 When the internet service name management checksum is changed, it is out-of-sync when the
auto-update is disabled on FortiManager.

830463 After shutting down the HA primary unit and then restarting it, the uptime for both nodes is zero, and
it fails back to the former primary unit.

830879 Running execute ha manage 0 <remote_admin> fails and displays a Permission


denied, please try again. error if the 169.254.0.0/16 local subnet is not in the trusted host
list.

832470 HA A-P clusters keeps getting out-of-sync due to local VPN certificate.

832634 HA failovers occur due to the kernel hanging on FG-100F.

835331 Communication is disrupted when HA switching is performed in an environment where the VDOM is
split to accommodate two IPoE lines.

837888 CLI deployment of a configuration to the secondary unit results in an unresponsive aggregate
interface.

838571 After an HA split-brain event, the PPPoE interfaces are not recovered.

839549 Secondary FortiGate unit in an HA cluster enters conserve mode due to high memory consumption
by node scripts.

840305 Static ARP entry is removed after reboot or HA failover.

840954 The HA pair primary keeps sending fgFmTrapIfChange and fnTrapIpChange after upgrading.

FortiOS 7.2.4 Release Notes 42


Fortinet Inc.
Resolved issues

Bug ID Description

843837 HA A-P virtual cluster information is not correctly presented in the GUI and CLI.

843907 Session load balancing is not working in HA A-A configuration for traffic flowing via the VLAN
interface when the port1 link is down on platforms with a 4.19 kernel.

846015 The first ICMP redirected from the FGSP secondary is dropped on the FGSP primary when UTM is
enabled.

852308 New factory reset box failed to synchronize with primary, which was upgraded from 7.0.

854445 When adding or removing an HA monitor interface, the link failure value is not updated.

856004 Telnet connection running ping fails during FGSP failover for virtual wire pair with VLAN traffic.

859242 Unable to synchronize IPsec SA between FGCP members after upgrading.

Hyperscale

Bug ID Description

771857 Firewall virtual IP (VIP) features that are not supported by hyperscale firewall policies are no longer
visible from the CLI or GUI when configuring firewall VIPs in a hyperscale firewall VDOM.

804742 After changing hyperscale firewall policies, it may take longer than expected for the policy changes
to be applied to traffic. The delay occurs because the hyperscale firewall policy engine
enhancements added to FortiOS may cause the FortiGate to take extra time to compile firewall
policy changes and generate a new policy set that can be applied to traffic by NP7 processors. The
delay is affected by hyperscale policy set complexity, the total number of established sessions to be
re-evaluated, and the rate of receiving new sessions.

807476 After packets go through host interface TX/RX queues, some packet buffers can still hold
references to a VDOM when the host queues are idle. This causes a VDOM delete error with
unregister_vf. If more packets go through the same host queues for other VDOMs, the issue
should resolve by itself because those buffers holding the VDOM reference can be pushed and get
freed and recycled.

810366 Unrelated background traffic gets impacted when changing a policy where a hyperscale license is
used.

824733 IPv6 traffic continues to pass through a multi-VDOM setup, even when the static route is deleted.

835697 Interface routes under DHCP mode remain in LPMD after moving the interface to another VDOM.

836474 Changes in the zone configuration are not updated by the NPD on hyperscale.

837270 Allowing intra-zone traffic is now supported in hyperscale firewall VDOMs. Options to block or allow
intra-zone traffic are available in the GUI and CLI.

843305 Get PARSE SKIP ERROR=17 NPD ERR PBR ADDRESS console error log when system boots up.

FortiOS 7.2.4 Release Notes 43


Fortinet Inc.
Resolved issues

ICAP

Bug ID Description

832515 Bad gateway occurs using ICAP with explicit proxy under traffic load.

834729 Extra unnecessary X-Authenticated-User/Group field appears in the ICAP header.

Intrusion Prevention

Bug ID Description

695464 High IPS engine CPU usage due to recursive function call.

755859 The IPS sessions count is higher than system sessions, which causes the FortiGate to enter
conserve mode.

771000 High CPU in all cores with device running with one interface set as a one-arm sniffer.

809691 High CPU usage on IPS engine when certain flow-based policies are active.

839170 Improvements to IPS engine monitor to resolve an error condition during periods of heavy traffic
loads.

856616 High IPS engine memory usage after device upgrade.

856837 Improvements to IPS engine to optimize memory usage when flow mode antivirus is applied.

IPsec VPN

Bug ID Description

757696 Implementing the route-overlap setting on phase 2 configurations brings tunnels down until a
reboot is not performed on the FGSP cluster.

763205 IKE crashes after HA failover when the enforce-unique-id option is enabled.

765174, Certain packets are causing IPsec tunnel drops on NP6XLite platforms after HA failover because
775279 the packet is not checked properly.

765868 The packets did not pass through QTM, and SYN packets bypass the IPsec tunnel once traffic is
offloaded. Affected platforms: NP7 models.

798045 FortiGate is unable to install SA (failed to add SA, error 22) when there is an overlap in
configured selectors.

803010 The vpn-id-ipip encapsulated IPsec tunnel with NPU offloading cannot be reached by IPv6.

FortiOS 7.2.4 Release Notes 44


Fortinet Inc.
Resolved issues

Bug ID Description

805301 Enabling NPU offloading in the phase 1 settings causes a complete traffic outage after a couple of
ping packets pass through.

807086 ADVPN hub randomly initiates secondary tunnel to spoke, causing spoke to drop tunnel traffic for
RPF check fail.

810833 IPsec static router gateway IP is set to the gateway of the tunnel interface when it is not specified.

815253 NP7 offloaded egress ESP traffic that was not sent out of the FortiGate.

819276 After changing the password policy to enable it, all non-conforming IPsec tunnels were wiped out
after rebooting/upgrading.

822651 NP dropping packet in the incoming direction for SoC4 models.

824532 IPsec learned route disappears from the routing table.

825523 NP7 drops outbound ESP after IPsec VPN is established for some time.

827350 Dialup selector routes are not deleted after iked crash.

828467 IKE repeatedly crashes with the combination of DDNS and dialup gateways.

828541 IPsec DPD packets keep getting sent while IPsec traffic passes through the tunnel (DPD mode is
on-idle).

828933 iked signal 11 crash occurs once when running a VPN test script.

829091 The iked daemon experiences a signal 11 crash when a static IPsec gateway is configured, the
FortiGates are in HA, and an HA state change occurs.

829939 Unable to send traffic in VXLAN over IPSec when the VTEP is configured in a VDOM.

830252 IPsec VPN statistics are not increasing on the device.

831817 Entering set domain <string> returns a not a valid dns domain error.

832920 Unable to edit the parent interface from the IPsec configuration if it was configured on an IPIP
tunnel.

836260 The IPsec aggregate interface does not appear in the Interface dropdown when configuring the
Interface Bandwidth widget.

840006 A new VPN interface with vpn-id-ipip encapsulation has MAC address ff:ff:ff:ff:ff and cannot set
remote the IP until the FortiGate reboots.

840153 Unexpected dynamic selectors block traffic when set mesh-selector-type subnet is
configured.

840940 Unable to reestablish a new IPsec L2TP connection for 10 minutes after the previous one
disconnected. The issue conditions are local in traffic and a policy-based IPsec tunnel.

842528 Improper IKEv1 quick mode fragmentation from third-party client can cause an IKE crash.

846361 OCVPN fails to create a policy when the interface belongs to a zone.

FortiOS 7.2.4 Release Notes 45


Fortinet Inc.
Resolved issues

Bug ID Description

855772 FortiGate IPsec tunnel role could be incorrect after rebooting or upgrading, and causes negotiation
to be stuck when it comes up.

858715 IPsec phase 2 fails when both HA cluster members reboot at the same time.

Log & Report

Bug ID Description

789007 Unable to select FortiAnalyzer as a data source on the Summary tab for the System Events and
Security Events pages.

814758 Get an intermittent error when running execute log fortianalyzer-cloud test-
connectivity.

820940 On the Log Settings page, a VDOM administrator can force a FortiCloud log out of for all VDOMs.

821359 FortiGate appears to have a limitation in the syslogd filter configuration.

821494 Forward traffic logs intermittently fail to show the destination hostname.

825318 Archived Data tab is missing from intrusion prevention and application control log Details pane once
log-packet is enabled.

826431 FortiGate Cloud log viewer shows no results for the 5 minutes and 1 hour time period due to an
incorrect timestamp (24 hours is OK).

826483 The dstname log field cannot store more than 66 characters.

828211 Policy ID filter is not working as expected.

829862 On the Log & Report > ZTNA Traffic page, the client's Device ID is shown as [object Object]. The
Log Details pane show the correct ID information.

834669 GTP/PFCP msg-type log field shows the name of GTP type. This breaks the workflow and DT
processes in the FortiAnalyzer event handlers, FortiAnalyzer datasets, and scripts.

836846 Packet captured by firewall policy cannot be downloaded.

837116 FortiCloud log statistics chart on the Log Settings page shows incorrect data.

838253 FortiAnalyzer log statistics chart on the Log Settings page shows incorrect data.

839601 When log pages are scrolled down, no logs are displayed after 500 lines of logs.

847213 Unable to mouse over an IP address in FortiGate logs.

850519 Log & Report > Forward Traffic logs do not return matching results when filtered with !<application
name>.

856613 Older Forward Traffic logs are not visible on the FortiGate with 1 hour, 24 hours, and 7 days time
period after upgrading.

FortiOS 7.2.4 Release Notes 46


Fortinet Inc.
Resolved issues

Bug ID Description

858304 When FortiGate Cloud logging is enabled, the option to display 7 days of logs is not visible on the
Dashboard > FortiView pages.

858589 Unable to download more than 500 logs from the FortiGate GUI.

Proxy

Bug ID Description

745701 An issue occurs with TLS 1.3 and the 0RTT process where Firefox cannot access https.google.com
using proxy-based UTM with certification inspection.

780182 WAD crash occurred when forwarding the release bytes from the IPS engine to the server and the
connection to the server is closed.

793651 An expired certificate can be chosen when creating an SSL/SSH profile for deep inspection.

795360 Apple push notification service fails with proxy-based inspection.

796150, When a server sends a connection close response too early, traffic from the client may be
857507 interrupted inadvertently before the request is completed.

797620 HTTPS sites blocked due to cert-probe-failed triggered by SSL exemption in deep inspection.

799237 WAD crash occurs when TLS/SSL renegotiation encounters an error.

799381 WAD crash occurs when TLS 1.2 receives the client certificate and that server-facing SSL port has
been closed due to the SSL bypass.

803286 Inspecting all ports in deep inspection is dependent on previous protocol port mapping settings.

805808 In proxy inspection mode with AV enabled, TCP traffic is dropped after a while.

808831 Upgrading broke IM controls and caused Zalo chat file transfer issues.

810792 WAD crashes when the following conditions are met: the FortiGate is an HA secondary, it is
configured with a web proxy forward server in a proxy policy, and the forward server has health
check enabled.

813562, When an LDAP user is authenticated in a firewall policy, the WAD user-info process has a memory
823247, leak causing the FortiGate to enter conserve mode.
823829,
829428

814061 Stress test shows cryptographic errors in proxy mode.

818371 An error condition occurs in WAD while parsing certain URIs.

822039 WAD crash occurs on FG-61E, FG-101F, FG-61F, FG-200E, and FG-401E during stress testing.

823814 When ZTNA access proxy is configured with set empty-cert-action accept-
unmanageable, users may receive an error loading the page when the client certificate is not
properly processed.

FortiOS 7.2.4 Release Notes 47


Fortinet Inc.
Resolved issues

Bug ID Description

825139 Image should be embedded directly into the replacement message page.

825496 Explicit proxy traffic is terminated when IPS is enabled. The exact failure happened upon certificate
inspection.

827882 One WAD daemon is consistently using 99% CPU.

830166 When WAN optimization is disabled and the dispatcher sends the tunnel manager listener to the
workers, the workers cannot handle it properly and a WAD crash segmentation fault occurs.

830450 Changing the virtual server configuration during traffic caused the old configuration to flush, which
resulted in a WAD crash.

830907 WAD crash occurs when configuring a proxy policy with no member in an address group.

834314 ICAP client timeout issue causes WAD segmentation fault crash after upgrading to 7.0.6 from 6.4.

834998 TLS 1.3 handshake fails in proxy mode when the FortiGate tries to obtain certificate information
from a specific server.

835903 There is no replacement message for an IPS custom signature block in a proxy inspection mode
firewall policy or proxy policy.

836198 Console randomly displays a read_tagbuf - 152: Failed to open device: /dev/sdb
errno:2(No such file or directory) error.

837568 Restricted SaaS access does not work as expected when config ssl inspect-all is enabled.

842197 Access proxy does not use the selected profile-protocol-options.

855882 Improvements to WAD to resolve a memory usage issue when user-info updates the FortiAP
information.

856235 The WAD process memory usage gradually increases over a few days, causing the FortiGate to
enter into conserve mode.

857368 An encoded HTTP header may be improperly handled, causing inadvertent disruption to traffic.

874563 User information attributes can cause disruption when they are not properly merged.

REST API

Bug ID Description

836760 The start parameter has no effect with the /api/v2/monitor/user/device/query API call.

847526 Able to add incomplete policies with empty mandatory fields using the REST API.

864393 High CPU usage of httpsd on FG-3600E HA system.

FortiOS 7.2.4 Release Notes 48


Fortinet Inc.
Resolved issues

Routing

Bug ID Description

769330 Traffic does not fail over to alternate path upon interface being down (FGR-60F in transparent
mode).

806501 Static routing using ISDB is randomly not working because the SD-WAN configuration is not flushed
from the kernel routing table when SD-WAN is disabled.

807433 Default routes are deleted after adding a new default route with a CIDR IP as a gateway.

819674 Virtual server active-standby failover is not working with a UDP server type.

822659 Secure SD-WAN Monitor in FortiAnalyzer does not show graphs when the SLA target is not
configured in SD-WAN performance SLA.

823293 Disabling BFD causes an OSPF flap/bounce.

823592 BGP confederation and AS prepend the route advertisement format.

828121 In a BGP neighbor, the allowas-in 0 value is confusing and not accepted by the GUI for
validation (1-10 required).

828345 Wrong MAC address is in the ARP response for VRRP IP instead of the VRRP virtual MAC.

828780 Router prefix list matching is not work properly for VPNv4 routes.

830254 When changing interfaces from dense mode to sparse mode, and then back to dense mode, the
interfaces did not show up under dense mode.

830383 Unable to configure IPsec static route.

833399 Static routes are incorrectly added to the routing table, even if the IPsec tunnel type is static.

833800 The speed-test-server list cannot be loaded due to limited buffer size.

834497 Traffic behaves differently for connected routes and IGP routes in an ADVPN or SD-WAN
environment.

836077 IPv6 SD-WAN health check is not working after a disconnection.

838091 Static routes from DHCP option 121 are not installed on the FortiGate acting as the DHCP client.

838907 IPv6 link local address is added into the routing table.

839669 Static route through an IPsec interface is not removed after the BFD neighbor goes down.

840691 FortiGate as an NTP server is not using SD-WAN rules.

843345 OSPF packets are unevenly distributed with the LAG hash algorithm.

847037 When the policy route has a gateway set, the FortiGate is not following the policy route to forward
traffic and sends unreasonable ARP requests.

848270 Reply traffic from the DNS proxy (DNS database) is choosing the wrong interface.

FortiOS 7.2.4 Release Notes 49


Fortinet Inc.
Resolved issues

Bug ID Description

850862 When creating a new rule on the Network > Routing Objects page, the user cannot create a route
map with a rule that has multiple similar or different AS paths in the GUI.

862165 FortiGate does not add the route in the routing table when it changes for SD-WAN members.

Security Fabric

Bug ID Description

753177 IoT device vulnerabilities should be included in security ratings.

809106 Security Fabric widget and Fabric Connectors page do not identify FortiGates properly in HA.

814796 The threat level threshold in the compromised host trigger does not work.

819192 After adding a Fabric device widget, the device widget does not appear in the dashboard.

822015 Unable to resolve dynamic address from ACI SDN connector on explicit web proxy.

824433 After authorizing a downstream FortiGate, an empty name and offline status appear in the device
registration wizard.

835765 Automation stitch trigger is not working when the threshold based email alert is enabled in the
configuration.

837347 Upgrading from 6.4.8 to 7.0.5 causes SDN firewall address configurations to be lost.

839258 Unable to add another FortiGate to the Security Fabric after updating to the latest patch.

843043 Only the first ACI SDN connector can be kept after upgrading from 6.4.8 if multiple ACI SDN
connectors are configured.

844412 When a custom LLDP profile has auto-isl disabled, the security rating test, Lockdown LLDP
Profile, fails.

848822 The FortiAP Firmware Versions and FortiSwitch Firmware Versions security rating tests fail
because the firmware version on the FortiAPs and FortiSwitches is not recognized correctly.

852340 Various places in the GUI do not show the secondary HA device.

853406 External resource full certificate check does not validate certificate when the URI is an IP address.

862532 Unable to load topology pages for a specific Security Fabric topology on the root and downstream
FortiGates.

FortiOS 7.2.4 Release Notes 50


Fortinet Inc.
Resolved issues

SSL VPN

Bug ID Description

705880 Updated empty group with SAML user does not trigger an SSL VPN firewall policy refresh, which
causes the SAML user detection to not be successful in later usage.

746230 SSL VPN web mode cannot display certain websites that are internal bookmarks.

776127 SSL VPN web proxy issue with Qlik web appliaction.

777790 Unable to select vip64 in nat64 firewall policy in the CLI if the srcintf is an SSL VPN interface.

783167 Unable to load GitLab through SSL VPN web portal.

784426 SSL VPN web mode has problems accessing ComCenter websites.

786056 VNC using SSL VPN web mode disconnects after 10 minutes.

804131 SSL VPN bookmark is not working in https://vpn.li***.lt.

808107 FortiGate is not sending Accounting-Request packet that contains the Interim-Update AVP when
two-factor authentication is assigned to a user (defined on the FortiGate) while connecting using
SSL VPN.

808444 SSL VPN bookmark does not work when usergroup name has an ampersand character (&).

809717 EICAR file cannot be blocked through the SSL VPN policy when NTurbo is enabled.

812006 The PROD-MDN-WS1 SSL VPN portal is not loading properly, and cannot navigate within the page.

812100 SSL VPN web mode fails to load some modules in customer's internal website (***.sri4.***).

818066 SSL VPN web proxy could not render web application that uses a URL to pass a JSESSIONID

818196 SSL VPN does not work properly after reconnecting without authentication and a TX drop is found.

819296 GUI should not use <server_ip> as a sender to send the SSL VPN configuration (it should use value
set in reply-to).

819754 Multiple DNS suffixes cannot be set for the SSL VPN portal.

820072 Unable to open internal website with JavaScript code in SSL VPN web mode.

820536 SSL VPN web mode bookmark incorrectly applies a URL redirect.

822432 SSL VPN crashes after copying a string to the remote server using the clipboard in RDP web mode
when using RDP security.

822657 Internal resource pages and menus are not showing correctly in SSL VPN web mode.

823054 Internal website with JavaScript lacks some menus in SSL VPN web mode.

824681 Some back-end server images (*.co***.com) could not be displayed in SSL VPN web mode.

825641 Camera application is not loading in SSL VPN web mode.

825750 VMware vCenter bookmark in not working after logging in to SSL VPN web mode.

FortiOS 7.2.4 Release Notes 51


Fortinet Inc.
Resolved issues

Bug ID Description

825810 SSL VPN web mode is unable to access EMS server.

826083 Unresponsive portal bookmark in SSL VPN web mode for server that does not support OpenSSL
3.0.2.

828153 Faulty web view for JavaScript web applications in SSL VPN web portal.

829663 A log in page display error occurs when using an SSL VPN web proxy.

829955 When using SSL VPN to do auto-reconnect without authentication, it always fails the second time it
tries to reconnect.

830532 Unable to access internal device in SSL VPN web mode.

830824 Veeam Backup Enterprise website has SSL VPN access problem in web mode.

831069 A blank page displayed after logging in to the back-end server in SSL VPN web mode.

834689 Unable to access customer's internal website in SSL VPN web mode.

834713 Getting re-authentication pop-up window for VNC quick connection over SSL VPN web proxy.

837028 Internal website cannot be displayed correctly in SSL VPN web mode.

839261 On the VPN > SSL-VPN Settings page, when the source-address-negate option is enabled for
an address in the CLI, the GUI does not display an exclamation mark against that address entry in
the Hosts field.
This is cosmetic and does not affect on the FortiGate functionality or operation. The source-
address-negate option being enabled can be confirmed in the CLI.

839743 Opening an SSL VPN web portal bookmark results in a blank page.

844175 SSL VPN web mode failed to load some modules for internal website.

847501 Internal website http://oc***.di***.com dropdown menu on an SSL VPN web mode bookmark in
always stays on and does not close.

848067 RDP over VPN SSL web mode stops work after upgrading.

848312 Unable to open a PDF in SSL VPN web mode.

848437 The sslvpn process crashes if a POST request with a body greater than 2 GB is received.

849488 Bookmark in SSL VPN web portal does not work as expected.

853556 The http://www.op***.org website does not work in SSL VPN web mode.

856316 Browser displays an Error, Feature is not available message if a file larger than 1 MB is uploaded
from FTP or SMB using a web bookmark, even though the file is uploaded successfully. There are
no issues with downloading files.

864417 In the second authentication of RADIUS two-factor authentication, the acct-update-interval


returned is 0. SSL VPN uses the second return and not send RADIUS acct-interim-update
packet.

FortiOS 7.2.4 Release Notes 52


Fortinet Inc.
Resolved issues

Switch Controller

Bug ID Description

818116 Add link status to managed FortiSwitch switch ports.

836604 The 40000cr4 port speed is not available under the switch-controller managed-switch
port speed settings.

840310 Managed FortiSwitch only shows one port of the FortiLink aggregate interface.

853718 Layer 3 FortiLink does not come up after upgrading.

854104 FortiLink daemon keeps pushing the configuration to FortiSwitch for a long time when the
FortiSwitch is deleted and re-discovered.

858113 On the WiFi & Switch Controller > Managed FortiSwitches page, when an administrator with
restricted access permissions is logged in, the Diagnostics and Tools page for a FortiSwitch cannot
be accessed.

System

Bug ID Description

199732 The interface used by a sniffer policy cannot be used in a zone.

686135 The dnp process goes to 100% CPU usage as soon as the configuration is downloaded via SCP.
Affected platforms: FGR-60F and FGR-60F-3G4G.

748409 Client traffic from VLAN to VXLAN encapsulation traffic is failing after upgrading.

751715 Random LTE modem disconnections due to certain carriers getting unstable due to WWAN modem
USB speed under super-speed.

757482 When fastpath is disabled, counters in the dashboard are showing 0 bytes TX/RX for a VLAN
interface configured on an LACP interface.

775793 Traffic shaping statistics do not work with NP7 offloading.

780315 Poor CPS performance with VLAN interfaces in firewall only mode (NP7 and NP6 platforms).

782962 PSU alarm log and SNMP trap are added for FG-10xF and FG-8xF models.

784169 When a virtual switch member port is set to be an alternate by STP, it should not reply with ARP;
otherwise, the connected device will learn the MAC address from the alternate port and send
subsequent packets to the alternate port.

787929 Deleting a VDOM that contains EMAC interfaces might affect the interface bandwidth widget of the
parent VLAN.

795104 A member of an LAG interface is not coming up due to a different actor key.

FortiOS 7.2.4 Release Notes 53


Fortinet Inc.
Resolved issues

Bug ID Description

798091 After upgrading from 6.4.9 to 7.0.5, the FG-110xE's 1000M SFP interface may fail to auto-negotiate
and cannot be up due to the missed auto-negotiation.

798303 The threshold for conserve mode is lowered.

798992 Get newcli crash when running the diagnose hardware test memory command.

800615 After a device reboot, the modem interface sometimes does not have a stable route with the local
carrier.

801040 Session anomaly was incorrectly triggered though concurrent sessions on the FortiGate that were
below the configured threshold.

804870 IPv6 DHCP relay packets traversing an npu_vlink are incorrectly sourced with the address of the
npu_vlink interface.

805122 In FIPS-CC mode, if cfg-save is set to revert, the system will halt a configuration change or
certificate purge.

805345 In some cases, the HA SNMP OID responds very slowly or does work correctly.

809030 Traffic loss occurs when running SNAT PBA pool in a hyperscale VDOM. The NP7 hardware
module PRP got stuck, which caused the NP7 to hang.

810879 DoS policy ID cannot be moved in GUI and CLI when enabling multiple DoS policies.

813162 Kernel panic occurs after traffic goes through IPsec VPN tunnel and EMAC VLAN interface.

814624 Get root.firewall.service.custom... configuration error after upgrading or changing LAN


extension to traffic VDOM.

815360 NP7 platforms may encounter a kernel panic when deleting more than two hardware switches at the
same time.

815692 Slow upload speeds when connected to FIOS connection. Affected platforms: NP6Lite and
NP6xLite.

816385 When creating an inner VLAN CAPWAP interface or sending inner VLAN traffic when the FortiGate
is rebooting/upgrading from capwap-offload disable status, these actions trigger a freeze.
Affected platforms: NP7 models.

818240 Running get system performance status does not update the data.

818452 The ifLastChange SNMP OID only shows zeros.

819460 There is no 1000auto option under the ports. Affected platforms: FG-110xE.

819667 1G copper SFP port is always up on FG-260xF.

819724 LTE fails to connect after the firewall reboots. Multiple reboots are required to bring back
connectivity.

821366 PPPoE is not working on FG-60E wan2 interface.

822297 Polling fgfwpolid returns disabled policies.

FortiOS 7.2.4 Release Notes 54


Fortinet Inc.
Resolved issues

Bug ID Description

823589 When pushing a script from FortiManager to FortiGate, FortiOS will sometimes send the CLI
change to FortiManager with the FGFM API. If the tunnel is not up, the session will not exist and it
causes a code crash.

824464 CMDB checksum is not updated when a certificate is renewed over CMP, causing a FortiManager
failure to synchronize with the certificate.

824528 The cid process is consuming high memory, and the FortiGate enters conserve mode.

824543 The reply-to option in the email server settings is no longer visible in a default server
configuration on FortiOS 7.2.0.

825741 DoS policy with custom service does not work as expected on a PPPoE interface.

826254 Get disk error message after changing disk usage to wanopt.

826440 Null pointer causing kernel crash on FWF-61F.

827240 FortiGate may not provide detailed information during a watchdog-initiated reboot.

827241 Unable to resolve sp***.saas.ap***.com on a specific VDOM.

827736 As the size of the internet service database expands, ffdb_err_msg_print: ret=-4,
Error: kernel error is observed frequently on 32-bit CPU platforms, such as the FG-100E.

829598 Constant increase (3%-4%) in memory occurs everyday.

831486 HQIP memory test failed and triggered a log out with a newcli process crash.

832154 The cmdbsvr process may crash when there are many addresses and address groups that include
each other recursively.

832429 Random kernel panic may occur due to an incorrect address calculation for the internet service
entry's IP range.

832948 Signature updating from FortiManager does not work after cloud communication is disabled.

832982 High fcnacd usage occurs and unable to retrieve EMS information from the FortiGate CLI.

833062 FortiGate becomes unresponsive, and there are many WAD and forticron crashes.

834138 Kernel panic occurs due to VXLAN.

834414 When the uplink modem is restarted, the FortiGate interface configured as PPPoE is unable to
obtain an IP address.

834641 Unable to remove DDNS entry frequently, even if the DDNS setting is disabled.

834762 Kernel panics occurs on secondary HA node on NP7 models (7.0.6).

835221 FG-4400F setting speed of 40000full on QSFP port is not applied at the NIC level.

836049 Unexpected device reboots with the kernel panic error on NP7 models.

836409 When deleting a non-existing entry, the error code returned is not appropriate.

837110 Burst in multicast packets is causing high CPU usage on multiple CPU cores.

837730 Trusted hosts are not working correctly in FortiOS 7.2.1.

FortiOS 7.2.4 Release Notes 55


Fortinet Inc.
Resolved issues

Bug ID Description

838933 DoS anomaly has incorrect threshold after loading a modified configuration file.

839190 Running get system auto-update versions causes newcli to crash and the prints quit at the
MAC address database.

840175 Random kernel panic occurs and causes the device to reboot.

841932 The GUI and API stopped working after loading many interfaces due to httpsd stuck in a D state
(kernel I/O socket).

844316 IPS and application control is causing the FortiGate (VWP) to change either the source MAC
address or the destination MAC address based on the flow.

844937 FG-3700D unexpectedly reboots after the COMLog reported a kernel panic due to an IPv6 failure to
set up the master session for the expectation session under some conditions.

845781 Kernel panic and regular reboots occur on NP7 platforms, which are caused by FortiOS trying to
offload a receiving ESP packet from the EMAC VLAN interface and convert to an IPv6 destination
address with NAT46 NPU offloaded sessions.

847077 Can't find xitem. Drop the response. error appears for DHCPOFFER packets in the
DHCP relay debug.

849186 Unexpected console error appears: unregister_netdevice: waiting for pim6reg1 to


become free. Usage count = 3.

850430 DHCP relay does not work properly with two DHCP relay servers configured.

850797 Remote access management from a FortiManager login fails if trusted hosts are configured for the
administrator account.

852562 Huge configuration files cause delays during the booting process.

853144 Network device kernel null pointer is causing a kernel crash.

853794 Issue with the server_host_key_algorithm compatibility when using SSH on SolarWinds.

855151 There may be a race condition between the CMDB initializing and the customer language file
loading, which causes the customer language file to be removed after upgrading.

856202 Random reboots and kernel panic on NP7 cluster when the FortiGate sends a TCP RST packet and
IP options are missing in the header.

859717 The FortiGate is only offering the ssh-ed25519 algorithm for an SSH connection.

860052 The 40G/100G port goes down on FG-260xF when upgrading to 7.2.

862941 GUI displays a blank page if vdom-admin user has partial permissions.

867978 Subnet overlap error occurs when configuring the same IPv4 link-local addresses on two different
interfaces.

FortiOS 7.2.4 Release Notes 56


Fortinet Inc.
Resolved issues

Upgrade

Bug ID Description

803041 Link lights on the FG-1100E fail to come up and are inoperative after upgrading.

822844 Observed Node exiting due to unhandled rejection error messages in crash log after
upgrading to 7.2.1.

832943 Upgrading from 7.0.5 (split-VDOM mode) to 7.2.0 converts to multi-VDOM). Certificates are not
exported in the backup configuration.

841808 Traffic counters in diagnose sys modem history become empty after upgrading from 6.4.

850691 The endpoint-control fctems entry 0 is added after upgrading from 6.4 to 7.0.8 when the
FortiGate does not have EMS server, which means the endpoint-control fctems feature was
not enabled previously. This leads to a FortiManager installation failure.

User & Authentication

Bug ID Description

790884 The FortiGate will not send a MAC-based authentication RADIUS authentication request for one of
the devices on the network.

810033 The samld process is killed if the SP certificate set has an ECC 384-bit public key.

818163 Remote RADIUS user password change does not work if password encoding is ISO-8859-1 on the
FortiGate.

819309 Unable to create a new guest user if its ID is the ASCII code of a character that is the name of a local
user.

820989 The srchwvendor, devtype, srcfamily, osname, and srchwversion log fields are not
populated properly if the devices are behind a router or proxy.

822684 When multiple FSSO CA connections are configured at the same time, only the last configured
FSSO connection comes up.

822923 When a device is detected as vulnerable, its source is not set and the inventory query quits.

823227 FortiGate is adding the same LDAP server in the list of LDAP servers to try twice in fnbamd.

824999 Subject Alternative Name (SAN) is missing from the certificate upon automatic certificate renewal
made by the FortiGate.

825505 After a few days, some devices are not displayed in the Users & Devices > Device Inventory widget
and WiFi & Switch Controller > FortiSwitch Ports page's Device Information column due to a
mismatch in the device count between the following commands.
l diagnose user device list

l diagnose user device stats

FortiOS 7.2.4 Release Notes 57


Fortinet Inc.
Resolved issues

Bug ID Description
l diagnose user-device-store device memory list

825759 The Device detection option is missing in the GUI for redundant interfaces (CLI is OK).

827458 A User device store query error (error code: -1) warning appears on the Asset Identity Center page.

828212 RADIUS Access Request message needs to be sent when the client reconnects during firewall
authentication session expiration.

829343 Unknown CA issue can be bypassed when connecting Fortinet hosted servers.

829656 The device identification scanner crashes due to delayed fragments.

833802 RADIUS re-authentication is not following RFC 2865 standards.

835859 Incorrect source MAC address is used in LLDP TX packet when the interface has https in
allowaccess.

836082 LLDP packets are not being received if mgmt is used as an HA management reservation interface.

839801 FortiToken purge in a VDOM clears all FortiToken statuses in the system.

841566 The cid process crashes when cloning of 60000 security policies.

842517 Adding a local user to a group containing many users causes a delay in GUI and CLI due to
cmdbsvr (high CPU).

843528 RADIUS MAC authentication using ClearPass is intermittently using old credentials.

851233 FortiToken activation emails should include HTTPS links to documentation instead of HTTP.

854114 Some embedded SSL certificates entered the Error state after enabling FIPS-CC.

856370 The EAP proxy worker application crashes frequently.

865166 A cid scan crash occurs when device detections happen in a certain order.

VM

Bug ID Description

740796 IPv6 traffic triggers <interface>: hw csum failure message on CLI console.

798717 Traffic/session logging incorrectly refers to SR-IOV secondary interfaces when the Rx is from fast
path.

820457 Dynamic address objects are removed after Azure API call failed and caused legitimate traffic drop.

825464 Every time the FortiGate reboots, the certificate setting reverts to self-sign under config
system ftm-push.

848279 SFTP backup not working with Azure storage account.

859165 Unable to enable FIPS cipher mode on FG-VM-ARM64-AWS.

859589 VPNs over Oracle Cloud stop processing traffic.

FortiOS 7.2.4 Release Notes 58


Fortinet Inc.
Resolved issues

Web Application Firewall

Bug ID Description

817673 Problem accessing some web servers when WAF and AV are enabled in same policy (proxy
inspection mode).

838913 The WAF is indicating malformed request false positives caused by incorrect setups of four known
headers: Access-Control-Max-Age, Access-Control-Allow-Headers, Access-Control-Allow-
Methods, and Origin.

Web Filter

Bug ID Description

742483 System events logs randomly contain a msg=UrlBwl-black gzopen fail message.

816781 FGSP cluster with UTM blocks websites when NTurbo or offloading is enabled.

829628 Support matching IPv4 mapped IPv6 hostnames in the URL filter.

829704 Web filter is not logging all URLs properly.

847676 Unrated is displayed, even if the system language is set to Japanese when the policy inspection
mode is set to flow.

852067 Duplicate agent field in web content block log.

WiFi Controller

Bug ID Description

807605 FortiOS exhibits segmentation fault on hostapd on the secondary controller configured in HA.

807713 FortiGate is not sending RADIUS accounting message consistently to RADIUS server for wireless
SSO.

809623 CAPWAP traffic is dropped when capwap-offload is enabled.

811953 Configuration installation from FortiManager breaks the quarantine setting, and the VAP becomes
undeletable.

821320 FG-1800F drops wireless client traffic in L2 tunneled VLAN with capwap-offload enabled.

821803 Wireless multicast traffic causes the cw_acd process to have high CPU usage and triggers a
hostapd crash.

824441 Suggest replacing the IP Address column with MAC Address in the Collected Email widget.

FortiOS 7.2.4 Release Notes 59


Fortinet Inc.
Resolved issues

Bug ID Description

827902 CAPWAP data traffic over redundant IPsec tunnels failing when the primary IPsec tunnel is down
(failover to backup tunnel).

828901 Connectivity loss occurs due to switch and FortiAPs (hostapd crash).

831736 Application hostapd crash found on FG-101F.

831932 The cw_acd process crashes several times after the system enters conserve mode.

834644 A hostapd process crash is shown in device crash logs.

837130 Wireless client shows portal related webpage while doing MAC authentication with MAB mode.

840717 CAPWAP daemon (cw_acd) experiences a signal 11 crash when reconnecting a FortiAP to the
FortiGate, and the FortiGate does not populate SA scan data on radio0 and radio1 of 231G
when starting the SA from the FortiGate GUI.

844172 The cw_acd process is deleting dynamic IPsec tunnels on the secondary device, which causes the
FortiAPs to disconnect on the primary device.

846730 Dynamic VLAN assignment is disabled in the GUI when editing an SSID with radius mac-auth
and dynamic-vlan enabled.

851507 FortiAP goes through DTLS_SETUP for standby session when the ACD count is set to multicore.

856038 The voice-enterprise value changed after upgrading.

856830 HA FortiGate encounters multiple hostapd crashes.

857084 Hostapd segmentation fault signal 6 occurs upon HA failover.

857140 Hostapd segmentation fault signal 11 occurs upon RF chamber setup.

857975 The cw_acd process appears to be stuck, and is sending several access requests for MAC
authentication.

858653 Invalid wireless MAC OUI detected for a valid client on the network.

861552 Wireless client gets disconnect from WiFi if it is connected to a WPA2 SSID more than 12 hours.

ZTNA

Bug ID Description

777190 Proxy policy disclaimer is not working, even when there is no url-map="/" configured on the
access proxy.

792829 WAD re-challenges user authentication upon HA failover.

822423 Support the browser version in the firewall proxy-address settings for the user agent.

828433 FortiAuthenticator Cloud zero trust tunnel (ZTNA connection) fails when EMS Fabric connector is
configured.

FortiOS 7.2.4 Release Notes 60


Fortinet Inc.
Resolved issues

Bug ID Description

832508 The EMS tag name (defined in the EMS server's Zero Trust Tagging Rules) format changed in 7.2.1
from FCTEMS<serial_number>_<tag_name> to EMS<id>_ZTNA_<tag_name>.
After upgrading from 7.2.0 to 7.2.1, the EMS tag format was converted properly in the CLI
configuration, but the WAD daemon is unable to recognize this new format, so the ZTNA traffic will
not match any ZTNA policies with EMS tag name checking enabled.

845321 An offline FortiClient should be immediately rejected by ZTNA.

848222 ZTNA TCP forwarding is not working when a real server is configured with an FQDN address type.
An FQDN address type that can resolve public IPs is not recommended for ZTNA TCP forwarding
on real servers because the defined internal DNS database zone is trying to override it at the same
time. By doing so, the internal private address may not take effect after rebooting, and causes a
ZTNA TCP forwarding failure due to the real server not being found.

859421 ZTNA server (access proxy VIP) is causing all interfaces that receive ARP request to reply with their
MAC address.

875589 An error case occurs in WAD when a client EMS tag changes.

Common Vulnerabilities and Exposures

Visit https://fortiguard.com/psirt for more information.

Bug ID CVE references

841788 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-42469

843331 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-41330

844920 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-41328

845847 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-41329

847483 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-41327

854171 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-42474

854227 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-42476

857368 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2023-33308

858793 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:

FortiOS 7.2.4 Release Notes 61


Fortinet Inc.
Resolved issues

Bug ID CVE references


l CVE-2022-43947

861922 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2023-28002

865932 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2022-45861

865935 FortiOS 7.2.4 is no longer vulnerable to the following CVE Reference:


l CVE-2023-22640

FortiOS 7.2.4 Release Notes 62


Fortinet Inc.
Known issues

The following issues have been identified in version 7.2.4. To inquire about a particular bug or report a bug, please
contact Customer Service & Support.

Anti Spam

Bug ID Description

877613 Mark as Reject can be still chosen as an Action in a block/allow list in the GUI.

Anti Virus

Bug ID Description

869398 FortiGate sends too many unnecessary requests to FortiSandbox and causes high resource usage.

908706 On the Security Profiles > AntiVirus page, a VDOM administrator with a custom administrator profile
cannot create or modify an antivirus profile belonging to the VDOM.
Workaround: set the VDOM administrator profile to super_admin.

Explicit Proxy

Bug ID Description

817582 When there are many users authenticated by an explicit proxy policy, the Firewall Users widget can
take a long time to load. This issue does not impact explicit proxy functionality.

865828 The internet-service6-custom and internet-service6-custom-group options do not


work with custom IPv6 addresses.

875736 The proxy-re-authentication-mode option has been removed in 7.2.4 and is replaced with
proxy-keep-alive-mode re-authentication. The new proxy-re-authentication-
time timer is associated with this re-authentication mode. There are two unresolved issues:
l After upgrading, the previously configured proxy-auth-timeout value for the absolute re-

authentication mode is not preserved in the new proxy-re-authentication-time.


l The new proxy-re-authentication-time is currently configured in seconds, but it

should be configured in minutes to be consistent with other related authentication timers (such
as proxy-auth-timeout).

FortiOS 7.2.4 Release Notes 63


Fortinet Inc.
Known issues

Bug ID Description

894557 In some cases, the explicit proxy policy list can take a long time to load due to a delay in retrieving
the proxy statistics. This issue does not impact explicit proxy functionality.
Workaround: restart the WAD process, or temporarily disable the WAD debugging process (when
FortiGate reboots, this process will need to be disabled again).
diagnose wad toggle

(use direct connect diagnose)

Firewall

Bug ID Description

719311 On the Policy & Objects > Firewall Policy page in 6.4.0 onwards, the IPv4 and IPv6 policy tables are
combined but the custom section name (global label) is not automatically checked for duplicates. If
there is a duplicate custom section name, the policy list may show empty for that section. This is a
display issue only and does not impact policy traffic.
Workaround: rename the custom section to unique name between IPv4 and IPv6 policies.

770541 In the Policy & Objects menu, the firewall, DoS, and traffic shaping policy pages take around five
seconds to load when the FortiGate cannot reach the FortiGuard DNS servers.
Workaround: set the DNS server to the FortiGuard DNS server.

843554 If the first firewall service object in the service list (based on the order in the command line table) has
a protocol type of IP, the GUI may incorrectly modify its protocol number whenever a new firewall
service of the same protocol type IP is created in the GUI.
This silent misconfiguration can result in unexpected behavior of firewall policies that use the
impacted service. For example, some 6K and 7K platforms have firewall service ALL (protocol type
IP) as the first service, and this can cause the ALL service to be modified unexpectedly.
Workaround: create a new service in the CLI, or move a non-IP type services to the top of the
firewall service list. For example, if ALL is the first firewall service in the list:
config firewall service custom
edit "unused"
set tcp-portrange 1
next
move "unused" before "ALL"
end

860480 FG-3000D cluster kernel panic occurs when upgrading from 7.0.5 to 7.0.6 and later.

861990 Increased CPU usage in softirq after upgrading from 7.0.5 to 7.0.6.

864612 When the service protocol is an IP with no specific port, it is skipped to be cached and causes a
protocol/port service name in the log.

884578 Unexpected behavior in WAD caused by enabling HTTP/2 while usingvirtual servers.
Workaround: under config firewall vip, set http-supported-max-version to http1.

FortiOS 7.2.4 Release Notes 64


Fortinet Inc.
Known issues

Bug ID Description

895946 Access to some websites fails after upgrading to FortiOS 7.2.3 when the firewall policy is in flow-
based inspection mode.
Workaround: access is possible with one of the following settings.
l Change the firewall policy inspection mode to proxy-based.

l Remove the IPS security profile from the firewall policy.

l Set tcp-mss-sender and tcp-mss-receiver in the firewall policy to 1300.

l Set tcp-mss to 1300 on the VPN tunnel interface.

l Bypass the inter-VDOM link (may work in applicable scenarios, such as if the VDOM default

route points to physical interface instead of an inter-VDOM).

GUI

Bug ID Description

677806 On the Network > Interfaces page when VDOM mode is enabled, the Global view incorrectly shows
the status of IPsec tunnel interfaces from non-management VDOMs as up. The VDOM view shows
the correct status.

825598 The FortiGate may display a false alarm message TypeError [ERR_INVALID_URL]:
Invalid URL in the crashlog for the node process. This error does not affect the operation of the
GUI.

853352 When viewing entries in the slide-out window of the Policy & Objects > Internet Service Database
page, users cannot scroll down to the end if there are over 100000 entries.

854180 On the policy list page, all policy organization with sequence and label grouping is lost.

881678 On the Network > Routing Objects page, editing a prefix list with a large number of rule entries fails
with an error notification that The integer value is not within valid range.
Workaround: edit a prefix list with a large number of rule entries in the CLI.

893560 When private data encryption is enabled, the GUI may become unresponsive and HA may fail to
synchronize the configuration.

898902 In the System > Administrators dialog, when there are a lot of VDOMs (over 200), the dialog can
take more than one minute to load the Two-factor Authentication toggle. This issue does not affect
configuring other settings in the dialog.
Workaround: use the CLI to configure two-factor-authentication under config system
admin.

FortiOS 7.2.4 Release Notes 65


Fortinet Inc.
Known issues

HA

Bug ID Description

818432 When private data encryption is enabled, all passwords present in the configuration fail to load and
may cause HA failures.

Hyperscale

Bug ID Description

802182 After successfully changing the VLAN ID of an interface from the CLI, an error message similar to
cmdb_txn_cache_data(query=log.npu-server,leve=1) failed may appear.

824071 ECMP does not load balance IPv6 traffic between two routes in a multi-VDOM setup.

841712 The nat64-force-ipv4-packet-forwarding command is missing under config system


npu.

843197 Output of diagnose sys npu-session {list | list-full} does not mention policy route
information.

872146 The diagnose sys npu-session list command shows an incorrect policy ID when traffic is
using an intra-zone policy.

IPsec VPN

Bug ID Description

885818 If a tunnel in an IPsec aggregate is down but its DPD link is on, the IPsec aggregate interface may
still forward traffic to a down tunnel causing traffic to drop.

892699 In an HA cluster, static routes via the IPsec tunnel interface are not inactive in the routing table when
the tunnel is down.
Workaround: in an SD-WAN scenario, a health check for the IPsec tunnel (SD-WAN member) with
update-static-route enable is required.
config system sdwan
config health-check
edit <name>
set server <address>
next
end
end

In a non-SD-WAN scenario, a link health monitor configuration is required.

FortiOS 7.2.4 Release Notes 66


Fortinet Inc.
Known issues

Bug ID Description
config system link-monitor
edit <name>
set srcintf <IPsec_phase1-interface_name>
set server <address>
set source-ip <IPsec_tunnel_IP or internal_interface_IP)
next
end

916260 The IPsec VPN tunnel list can take more than 10 seconds to load if the FortiGate has large number
of tunnels, interfaces, policies, and addresses. This is a GUI display issue and does not impact
tunnel operation.

Log & Report

Bug ID Description

860822 When viewing logs on the Log & Report > System Events page, filtering by domain\username does
not display matching entries.
Workaround: use a double backslash (domain\\username) while filtering or searching by username
only without the domain

Remote Access

Bug ID Description

837391 FortiClient does not send the public IP address for SAML, resulting in 0.0.0.0 being shown in
FortiOS and SASE.

Routing

Bug ID Description

846107 IPv6 VRRP backup is sending RA that causes routing issue.

856462 When there are multiple routes in the link monitor, they are not withdrawn from the routing table
when the link monitor is not functioning as expected.

897940 Link monitor's probe timeout value range is not appropriate when the user decreases the minimum
interval.

FortiOS 7.2.4 Release Notes 67


Fortinet Inc.
Known issues

Bug ID Description

924598 The Network dashboard may not load if the administrator disables SD-WAN Interface under System
> Feature Visibility.
Workaround: enable SD-WAN Interface under System > Feature Visibility, or remove the SD-WAN
widget from the Network dashboard.

Security Fabric

Bug ID Description

825291 On the Security Fabric > Security Rating page, security rating test for FortiAnalyzer fails when
connected to FortiAnalyzer Cloud.

862424 On a FortiGate that has large tables (over 1000 firewall policies, address, or other tables for
example), security rating reports may cause the FortiGate to go into conserve mode.

880011 When the Security Fabric is enabled and admin-https-redirection is enabled on a


downstream FortiGate, the following GUI features do not work for the downstream FortiGate when
the administrator manages the downstream FortiGate using the root FortiGate's GUI:
l Web console access

l Diagnostic packet capture


l GUI notification when a new device joins or leaves the Security Fabric
l GUI notification if a configuration on the current page changes
These features still work for the root FortiGate's GUI.
Workaround: disable admin-https-redirection on the downstream FortiGate.

SSL VPN

Bug ID Description

795381 FortiClient Windows cannot be launched with SSL VPN web portal.

FortiOS 7.2.4 Release Notes 68


Fortinet Inc.
Known issues

Switch Controller

Bug ID Description

904640 When a FortiSwitch port is reconfigured, the FortiGate may incorrectly retain old detected device
data from the port that results in an unexpected number of detected device MACs for the port. Using
diagnose switch-controller mac-cache show to check the device data can result in the
Device Information column being blank on the WiFi & Switch Controller > FortiSwitch Ports page or
in the Assets widget.
Workaround: disable the device retention cache to remove old device data.
config switch-controller global
set mac-retention-period 0
end

911232 Security rating shows an incorrect warning for unregistered FortiSwitches on the WiFi & Switch
Controller > Managed FortiSwitches.
Workaround: select a FortiSwitch and use the Diagnostics & Tools tooltip to view the correct
registration status.

System

Bug ID Description

666664 Interface belonging to other VDOMs should be removed from interface list when configuring a
GENEVE interface.

799570 High memory usage occurs on FG-200F.

859795 High CPU utilization occurs when relay is enabled on VLAN, which prevents users from getting an
IP from DHCP.

861962 When configuring an 802.3ad aggregate interface with a 1 Gbps speed, the port's LED is off and
traffic cannot pass through. Affected platforms: 110xE, 220xE, 330xE, 340xE, and 360xE.

882187 FortiGate might enter conserve mode if disk logging is enabled and log-traffic all is set in a
policy.

883071 Kernel panic occurs due to null pointer dereference.

884023 When a user is logged in as a VDOM administrator with restricted access and tries to upload a
certificate (System > Certificates), the Create button on the Create Certificate pane is grayed out.

887940 Status light is not showing on the FortiGate 60F or 100F after a cold and warm reboot.

1041457 The kernel 4.19 cannot concurrently reassemble IPv4 fragments for a source IP with more than 64
destination IP addresses.

FortiOS 7.2.4 Release Notes 69


Fortinet Inc.
Known issues

Upgrade

Bug ID Description

903113 Upgrading FortiOS firmware with a local file from 6.2.13, 6.4.12, 7.0.11, or 7.2.4 and earlier may fail
for certain models because the image file size exceeds the upload limit. Affected models: FortiGate
6000 and 7000 series, FWF-80F-2R, and FWF-81F-2R-POE.
Workaround: upgrade the firmware using FortiGuard, or manually increase the HTTP request size
limit to 200MB.
config system global
set http-request-limit 200000000
end

925567 When upgrading multiple firmware versions in the GUI, the Follow upgrade path option does not
respect the recommended upgrade path.

User & Authentication

Bug ID Description

823884 When a search is performed on a user (User & Authentication > User Definition page), the search
results highlight all the groups the user belongs to.

853793 FortiGate 81F 802.1X MAC authentication bypass (MAB) failed to authenticate Cisco AP.

VM

Bug ID Description

878074 FG-ARM64-GCP and FG-ARM64-AZURE have HA synchronization issue with internal IP after
failover.

881728 Kernel hangs on FG-VM64-AZURE.

899984 If FGTVM was deployed in UEFI boot mode, do not downgrade to any GA version earlier than 7.2.4.

FortiOS 7.2.4 Release Notes 70


Fortinet Inc.
Known issues

Web Filter

Bug ID Description

766126 Block replacement page is not pushed automatically to replace the video content when using a
video filter.

885222 HTTP session is logged as HTTPS in web filter when VIP is used.

WiFi Controller

Bug ID Description

814541 When there are extra large number of managed FortiAP devices (over 500) and large number of
WiFi clients (over 5000), the Managed FortiAPs page and FortiAP Status widget can take a long
time to load. This issue does not impact FortiAP operation.

869106 The layer 3 roaming feature may not work when the wireless controller is running multiple cw_acd
processes (when the value of acd-process-count is not zero).

869978 CAPWAP tunnel traffic over tunnel SSID is dropped when offloading is enabled.

873273 The Automatically connect to nearest saved network option does not work as expected when FWF-
60E client-mode local radio loses connection.

903922 Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over
50). This issue does not impact FortiAP management and operation.

904349 Unable to create FortiAP profile in the GUI for dual-5G mode FortiAP U231F/U431F models.
Workaround: use the CLI to update the profile to dual-5G mode.

FortiOS 7.2.4 Release Notes 71


Fortinet Inc.
Built-in AV Engine

Built-in AV Engine

AV Engine 6.00285 is released as the built-in AV Engine. Refer to the AV Engine Release Notes for information.

FortiOS 7.2.4 Release Notes 72


Fortinet Inc.
Built-in IPS Engine

Built-in IPS Engine

IPS Engine 7.00255 is released as the built-in IPS Engine. Refer to the IPS Engine Release Notes for information.

FortiOS 7.2.4 Release Notes 73


Fortinet Inc.
Limitations

Citrix XenServer limitations

The following limitations apply to Citrix XenServer installations:


l XenTools installation is not supported.
l FortiGate-VM can be imported or deployed in only the following three formats:
l XVA (recommended)

l VHD

l OVF

l The XVA format comes pre-configured with default configurations for VM name, virtual CPU, memory, and virtual
NIC. Other formats will require manual configuration before the first power on process.

Open source XenServer limitations

When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may arise
when using the QCOW2 format and existing HDA issues.

FortiOS 7.2.4 Release Notes 74


Fortinet Inc.
www.fortinet.com

Copyright© 2024 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein
may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were
attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance
results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract,
signed by Fortinet’s Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only
the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal
conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change,
modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.

You might also like