FortiOS v2.80 MR12 Release Notes
FortiOS v2.80 MR12 Release Notes
Fortinet Inc.
Table of Contents
1 FortiOS v2.80 Maintenance Release 12....................................................................................................................................1 2 Upgrade Information.................................................................................................................................................................2 2.1 General...............................................................................................................................................................................2 2.2 AV Signature Changes ......................................................................................................................................................2 2.3 Special Notices...................................................................................................................................................................2 2.4 Upgrading from FortiOS v2.50..........................................................................................................................................4 2.5 Upgrading from FortiOS v2.80..........................................................................................................................................6 2.6 Downgrade Notice..............................................................................................................................................................7 2.7 FortiManager System Support............................................................................................................................................7 3 FortiOS v2.80 Features..............................................................................................................................................................8 3.1 System................................................................................................................................................................................8 3.1.1 Role Based Administration........................................................................................................................................8 3.1.2 Configuration File Backup Improvements.................................................................................................................8 3.1.3 Redesigned WebUI....................................................................................................................................................8 3.1.4 Redesigned CLI .......................................................................................................................................................9 3.1.5 Dynamic DNS Support..............................................................................................................................................9 3.1.6 Multiple Secondary IP Addresses Per Interface........................................................................................................9 3.1.7 IPv6 Traffic Forwarding............................................................................................................................................9 3.1.8 ADSL (PPPoE ) Connection Idle Timeout Support ...............................................................................................10 3.1.9 PPPoE and DHCP Relay Support............................................................................................................................10 3.1.10 Virtual Domain Support in NAT and Transparent Modes.....................................................................................10 3.1.11 Improved "out-of-the-box" Usability for SOHO Models......................................................................................10 3.1.12 Support Extended and Non-Latin1(ISO 8850-1) Characters.................................................................................11 3.1.13 User Field Improvements.......................................................................................................................................11 3.1.14 One-Button Transmission of FortiGate System Info For Troubleshooting...........................................................11 3.1.15 IEEE 802.11 WLAN Client Mode Supported.......................................................................................................11 3.1.16 Alert Email Address Length..................................................................................................................................11 3.1.17 Console Paging Mode............................................................................................................................................11 3.1.18 LCD........................................................................................................................................................................11 3.1.19 Compressed Configuration Back-up Files.............................................................................................................12 3.1.20 AV/NIDS Updates.................................................................................................................................................12 3.1.21 Internal Modem Support for FortiGate-60M.........................................................................................................12 3.1.22 Bug Reporting........................................................................................................................................................12 3.1.23 Alert Message Console..........................................................................................................................................13 3.1.24 Forwarding Domains.............................................................................................................................................13 3.2 High Availability..............................................................................................................................................................13 3.2.1 Non-dedicated HA Port............................................................................................................................................13 3.2.2 Link Fail-over..........................................................................................................................................................13 3.2.3 Firmware Upgrade and Configuration Upload........................................................................................................13 3.2.4 HA Link Security.....................................................................................................................................................13 3.2.5 Support for FortiGate-60/100/200 and FortiWiFi-60 Models.................................................................................13 3.2.6 HA Active-Active Mode Now Can Load Balance Non-AV Traffic.......................................................................14 3.2.7 HA Synchronization Status......................................................................................................................................14 3.3 Router ..............................................................................................................................................................................14 3.3.1 Policy Route WebUI................................................................................................................................................14 3.3.2 Routing Monitor.......................................................................................................................................................14 3.3.3 Enhanced RIP Routing Protocol Support ...............................................................................................................14 3.3.4 OSPF Routing Protocol Support..............................................................................................................................14 3.4 Firewall.............................................................................................................................................................................15 3.4.1 Protection Profile.....................................................................................................................................................15 3.4.2 Improved Custom TCP/IP Support and Pre-defined Services ................................................................................15 3.4.3 Increased Maximum Number of Policy Routes on High-end Models.....................................................................15 3.4.4 IP Address Ranges...................................................................................................................................................15
Fortinet Inc.
3.4.5 Multiple IP Pools.....................................................................................................................................................15 3.4.6 DiffServ Settings......................................................................................................................................................16 3.4.7 Static NAT (SNAT) Port Floating...........................................................................................................................16 3.4.8 SIP Support..............................................................................................................................................................16 3.5 FortiGuard Antivirus.....................................................................................................................................................16 3.5.1 Heuristic Virus Detection........................................................................................................................................16 3.5.2 Grayware Protection................................................................................................................................................16 3.5.3 Submit Quarantined Virus Sample to Fortinet.........................................................................................................16 3.5.4 HTML Link for Scanned Virus Detection...............................................................................................................16 3.5.5 Append Customized Text to Email Messages.........................................................................................................17 3.5.6 PPTP and L2TP AV scanning..................................................................................................................................17 3.5.7 High-end Models AV Optimize Command.............................................................................................................17 3.5.8 Antivirus Scan Support for ARJ Compression Format............................................................................................17 3.5.9 File Uncompression Maximum for AV Scanning...................................................................................................17 3.5.10 Windows Control Panel Extensions Support.........................................................................................................17 3.5.11 FortiGuard Antivirus and FortiGuard Intrusion Protection.............................................................................17 3.6 VPN..................................................................................................................................................................................18 3.6.1 IPSec Tunnel Support in Transparent Mode............................................................................................................18 3.6.2 DHCP Support Over IPSec......................................................................................................................................18 3.6.3 User Authentication via RSA SecurIDTM..............................................................................................................18 3.6.4 IP Address Range Support in IPSec Firewall Policies.............................................................................................18 3.6.5 Overlapping Address Support .................................................................................................................................18 3.6.6 Central Site Internet Access.....................................................................................................................................18 3.6.7 IPSec Dynamic DNS support...................................................................................................................................19 3.6.8 Policy Selector in IPSec Phase2..............................................................................................................................19 3.6.9 Site-to-Site/Dialup Tunnels.....................................................................................................................................19 3.7 Spam Filter.......................................................................................................................................................................19 3.7.1 Content Filtering......................................................................................................................................................19 3.7.2 FortiGuard AntiSpam Service...............................................................................................................................20 3.8 IPS Functionality..............................................................................................................................................................20 3.8.1 Dynamic Threat Prevention System........................................................................................................................20 3.8.2 IPS signature Autoupdate........................................................................................................................................20 3.9 Web Content Filtering......................................................................................................................................................21 3.10 Log & Reporting.............................................................................................................................................................21 4 MR12 Release Issues...............................................................................................................................................................23 4.1 Resolved Issues in FortiOS v2.80 MR12.........................................................................................................................23 4.1.1 HA.............................................................................................................................................................................23 4.1.2 VPN...........................................................................................................................................................................23 4.1.3 System.......................................................................................................................................................................23 4.2 Resolved Issues in FortiOS v2.80 MR11 and Earlier.......................................................................................................24 4.2.1 System......................................................................................................................................................................24 4.2.2 WebUI.......................................................................................................................................................................25 4.2.3 HA............................................................................................................................................................................26 4.2.4 Router ......................................................................................................................................................................26 4.2.5 Firewall....................................................................................................................................................................27 4.2.6 FortiGuard................................................................................................................................................................28 4.2.7 VPN..........................................................................................................................................................................28 4.2.8 IPS............................................................................................................................................................................29 4.2.9 Logging & Reporting...............................................................................................................................................29 4.2.10 FortiGuard AntiSpam..........................................................................................................................................30 4.2.11 Antivirus.................................................................................................................................................................30 5 Known Issues in FortiOS v2.80 MR12....................................................................................................................................31 5.1 HA.....................................................................................................................................................................................31 5.2 IPS.....................................................................................................................................................................................31 5.3 VPN...................................................................................................................................................................................32 5.4 System...............................................................................................................................................................................32 April 28, 2006 ii
Fortinet Inc.
5.5 Router................................................................................................................................................................................32 5.6 Antivirus............................................................................................................................................................................32 6 Image MD5 Checksums..........................................................................................................................................................34 Change Log Rev. 1.0 - Initial Release. Copyright 2006 Fortinet Inc. All rights reserved. Release Notes FortiOS v2.80 MR12
iii
Fortinet Inc.
Fortinet Inc.
2 Upgrade Information
2.1 General
FortiOS v2.80 MR12 supports all FortiGate models except the FortiGate-50. For the high-end models, FortiGate-3000 and higher, there are specific images to support different Virtual Domain (VDom) maximums. Save a copy of your FortiGate unit configuration (including replacement messages and content filtering lists) prior to upgrading. Note: The TFTP upgrade erases all current firewall configuration and replaces it with the Factory Default settings.
IMPORTANT! After any version upgrade, [WebUI display] if you are using the GUI, clear the browser cache prior to login to the FortiGate unit to ensure proper display of the GUI screens.
[Update the AV/NIDS definitions] The AV/NIDS signature included with an image upgrade may be older than currently available from FortiGuard. Fortinet recommends performing an "Update Now" as soon as possible after upgrading. (Consult the FortiGate User Guide for detailed procedures.)
icmp_flood (clear_session => disable) ping_death (drop => disable) large_icmp (none => disable) udp_flood (drop_session => disable)
Clock Configuration
The system daylight savings mode must configured before the timezone and current time is set. This is required, as the correct time, as set by the user, is influenced by the timezone, and the daylight savings mode.
Fortinet Inc.
SMTP Splice
Starting in FortiOS v2.80 MR10, the ability to disable SMTP splice is supported when AV scanning is enabled. SMTP splice is enabled by default when AV scanning is enabled in the firewall policy, but can be turned off through the CLI. Administrators can choose between AV scanning or spam filter tagging of SMTP traffic since the AV splice operation now precludes the use of tagging an email message with a spam subject-line tag. (Splice means that the FortiGate Antivirus Firewall sends part of the message or file to the destination address while it perfoms AV scanning.)
FTP Splice
FTP splice now can be disabled or enabled.
Fortinet Inc.
Each static route entered in the firewall has an index when entered either through the GUI or through the CLI. The index is used as the priority of the static route a lower index value has a higher preference. Changes to affect the priority of identical static routes are made through the CLI.
Log Policies
The Log policy "Local" and "Console" setting found in FortiOS v2.50 is not supported in FortiOS v2.80.
Image names that begin with "FGT_BOOST" are for the "FG5002FB2" blades. Image names that begin with "FGT_5000" are for the "FG5001" blades.
File Blocking
File blocking is not supported for file names encoded in the following character sets: X-SJIF for Japanese characters GB231 for Simplified Chinese characters BIG5 for Traditional Chinese characters EUC-KR for Korean characters
Replacement Messages
Filenames that contain the following character sets are renamed to question marks in the replacement message: X-SJIF for Japanese characters GB231 for Simplified Chinese characters BIG5 for Traditional Chinese characters EUC-KR for Korean characters
Fortinet Inc.
Configuration File
FortiOS v2.50 CLI commands are incompatible with the FortiOS v2.80 CLI commands. Attempts to restore a configuration file from FortiOS v2.50 will fail. The existing configuration on a unit running v2.50 will be upgraded to the new v2.80 syntax automatically during the upgrade process.
Admin Password
The "admin" password and passwords for other administrator users are now preserved when upgrading from v2.50.
Secondary IP Addresses
The secondary IP address settings assigned to interfaces are now retained upon upgrade to v2.80 MR5. Previous v2.80 MR releases did not keep the secondary IP addresses. (Bug ID 16211 now resolved.)
HDD Reformat
If your model has a hard disk, back-up the log files then run "exec formatlogdisk" from the CLI or accept the pop-up window prompt in the WebUI after the first login. Note that this operation will erase any existing log files on the hard disk, requires several minutes to complete, and involves a system reboot. Backup the log files before executing this command and choose a low traffic period since there is a brief interruption while the unit reboots.
HA Cluster Upgrade
To upgrade a High Availability cluster from a FortiOS v2.50 version, each cluster member must be upgraded while the unit is off-line and disconnected from the HA Cluster. While disconnected from the HA cluster, the HA-monitored interfaces of the unit must be connected to a hub or switch to prevent a "linkfail" state which will prevent login to the unit.
Fortinet Inc.
VLAN Configurations
VLAN configurations are not not retained when upgrading from FortiOS v2.50. Please manually update each value as per settings in FortiOS v2.50 after the upgrade.
HA Cluster Upgrade
To upgrade a High Availability Cluster from a previous FortiOS v2.80 version, only the Master unit needs to be upgraded if the current version is FortiOS v2.80. The Slave units will be automatically upgraded by the Master unit.
Fortinet Inc.
However, if step 3. is skipped, the static NAT VIP will not work. Existing VIPs prior to upgrade are not affected.
Fortinet Inc.
3.1 System
3.1.1 Role Based Administration
Description: Prior to the FortiOS v2.80 release, we allow for multiple system administrators to be created per FortiGate unit, with each assigned different access rights from read only to read/write. More granularity has been added in FortiOS v2.80 to expand the access rights from the system level to the object level. With FortiOS v2.80, the following objects within a FortiGate unit can be configured for each system administrator as "Not Accessible", "Read Only", and "Read/write": Device status Log and report Device configuration Users Security Policy Administrator This permits definition of multiple administrator users with varying read and write capabilities based on administrator profiles. For example, a Cryptographic officer may be assigned an administration user profile with only read-write capabilities for the VPN area of the firewall. Administrators have access to all of the virtual domains on the FortiGate unit. Administrators logging into the CLI or web-based manager always log into the root domain and then must enter the virtual domain that they want to administer.
3.1.2
Description: FortiOS v2.80 provides a consolidated backup function, enabling backup for system configuration, content filtering URL list, content filtering key words, content filtering exempt list, email filtering black and white list as well as key words, and NIDS/IDP settings, in a single place on the WebUI. Description: DHCP server leases will now be backed up on whenever the system re-starts (e.g. Reboot, shutdown, reload, mode change, or upgrade). This preserves the dyanmic IP assignments when the FortiGate unit is acting as a DHCP server.
3.1.3
Redesigned WebUI
Description: The WebUI has been redesigned extensively for improved usability and convenience. Improved status and session monitoring Improved workflow through rearranging some functional tasks (e.g. Maintenance page for download of all configuration and settings) Improved usability of complex WebUI pages (optional "advanced" sections to configure complicated functions) Access the CLI from the WebUI pop-up window Improved security (support for TLS) Context-sensitive online help Improved support for NetscapeTM and MozillaTM browsers Browser window title shows FortiGate hostname New Log-in screen that hides the sidebar menu prior to log-in to the FortiGate Antivirus Firewall Pop-up window for formating of hard disk after upgrade if required (post-MR4 releases) Formatted Log display to view the log messages from the WebUI in "raw" format or a parsed column format. To preserve a custom column setting and order for the current login session, cookie support must be enabled in your HTML browser.
Fortinet Inc.
Description: Coloured status icons are now used to indicate Update Center and FortiGuard availability.
Content Summary Description: Content Summary section in System Status screen shows recent HTTP, FTP, and email activity. Policy ID in Session Monitor Description: The session monitor page in the WebUI now shows the corresponding firewall policy ID number.
3.1.4
Redesigned CLI
Description: Version 2.80 of the FortiOS introduces major changes to the Command Line Interface (CLI). The method of entering commands, as well as the structure, navigation, command types, and command branches have all changed. Type "tree" to view the entire CLI command tree of commands and options (This is a long list.). For a comparison of FortiOS versions 2.50 and 2.80 command branches, see the following table. CLI enhancements The FortiGate CLI functionality has been enhanced with the following changes:
Basic HA information is added to the output of "get system status" DHCP and PPPoE information is now displayed in CLI "get system interface"
Comparison of FortiOS versions v2.50 and v2.80 command branches v2.50 v2.80 Description of change set config, set unset get execute show diagnose diagnose The config command branch replaces the set command branch. The config branch uses configuration shells. The set command is still used for setting functional parameters. The unset function has been moved under the config branch. The get command branch has some changes to how it functions. The execute command branch has been updated. The show command branch is new. The diagnose command branch has been updated.
See the FortiOS v2.80 CLI Reference Guide for a complete description of how to use the v2.80 CLI structure. Note: FortiOS v2.50 CLI commands are incompatible with the FortiOS v2.80 CLI commands. Attempts to restore a configuration file from FortiOS v2.50 will fail. An existing FortiOS v2.50 configuration can be upgraded, or a new configuration must be entered via the FortiOS v2.80 CLI or WebUI.
3.1.5
Description: FortiOS v2.80 adds Dynamic DNS (DDNS) support to the interface configuration to map a dynamic IP address to a static hostname. New DDNS servers support include: dhs.org, dyndns.org, dyns.net, ods.org, tzo.com, dnsalias.com, dnsart.com, vavic.com, dipdns.com, now.net.cn
3.1.6
Description: An interface can now be assigned multiple secondary IP addresses. In FortiOS v2.50 only a single secondary IP address was allowed; FortiOS v2.80 allows up to 32 secondary IP addresses. This is a CLI-only command.
3.1.7
Description: FortiOS v2.80 provides forwarding of IPv6 traffic and is configured through the CLI. (Other FortiGate functions such as firewall polices, content filtering, AV scanning, etc. are currently not available for IPv6 traffic.)
Fortinet Inc.
3.1.8
Description: To support better ADSL environments using PPPoE and where service providers bill based on connection time, an idle timeout option can be configured to automatically disconnect the connection after a period of inactivity. In PPPOE mode there will now be two other options on "system interface", lcp-echo-interval and lcp-max-echo-failures. lcpecho-interval controls the interval in seconds between lcp echo requests and max failures sets the number of missed requests before the ppp link is concidered dead, and reconnected. CLI commands: config set set set end system <interface> mode pppoe lcp-echo-interval <seconds> lcp-max-echo-fails <# of attempts>
3.1.9
Description: Dynamic addressing using PPPoE on an interface can now support DHCP relay to allow client DHCP requests to be forwarded to a pre-configured DHCP server accessible from another FortiGate interface.
HTTP is enabled by default on the Internal interface DNS Forwarding The client PC sets its DNS server address the local FortiGate interface and all DNS requests sent to FortiGate unit are relayed to the DNS server configured in FortiGate unit (GUI: System > Network > DNS).
10
Fortinet Inc.
Increase maximum length to 20 single-byte characters for the LDAP CN ID field Permit the whitespace character in user names
3.1.18 LCD
Description: Changes entered on the LCD panel can be aborted by pressing the "ESC" key. Previously, the data entry had to be completed. Description: The HA status is now displayed on the LCD display of models supporting HA and LCD displays. The LCD will show one of "Standalone, Primary, or Slave #", along with the mode "A-A or A-P."
11
Fortinet Inc.
12
Fortinet Inc.
3.2.2
Link Fail-over
Description: If a monitored cluster member interface detects a link failure, the cluster member reports the status of its links to the primary unit. The primary unit attempts to re-balance traffic according to the link failure status of all cluster members. If an interface on the primary unit detects a link failure, the primary with the next highest HA score becomes the primary unit. Note that AV scanned sessions do not fail-over when a cluster member fails.
3.2.3
Description: To improve ease of maintenance, HA in v2.80 supports firmware upgrade and configuration upload while in operation. Once the master unit has been updated, then the slave cluster members will be automatically updated.
3.2.4
HA Link Security
Description: HA data is now encrypted between members of an HA cluster. This reduces the effectiveness of a malicious attack through re-play or spoofed data using the HA interfaces.
3.2.5
Description: HA is now supported on FortiGate-60, FortiGate-100, FortiGate-200 and FortiWiFi-60 models. For the FortiWiFi-60, the WLAN interface is not a supported HA interface.
13
Fortinet Inc.
3.2.6
Description: HA Active-Active mode can now load-balance all TCP sessions. Previously, only AV scanned traffic (e.g. HTTP, SMTP, POP3, etc.) would have the sessions distributed among the HA cluster members. Load-balancing is disabled by default. Note that AV scanned sessions do not fail-over when a cluster member fails.
3.2.7
HA Synchronization Status
A new CLI command has been added to show if slave and primary units have synchronized. CLI command: diag sys ha checksync
3.3 Router
3.3.1 Policy Route WebUI
Description: Previously only available through the CLI, FortiOS v2.80 MR3 allows configuration of static policy routes through the WebUI (Router > Policy). Policy routing will route packets based on:
Source address Protocol, service type, or port range Incoming or source interface
3.3.2
Routing Monitor
Description: The FortiGate routing table can now be viewed from the WebUI (Router > Monitor) or CLI ("get router info routing_table"). This allows the administrator to view all the static and dynamic routes that influence traffic routing.
3.3.3
Description: RIP routing protocol support has been enhanced to include: Classful and Classless subnet support Keychain security Offset, distribution, and redistribution lists Access, prefix, and router map lists Split horizon Database and status viewing
3.3.4
Description: OSPF routing protocol support has been added in FortiOS v2.80 with the following features: OSPF Version 2 Support OSPF Area Support (50 maximum) Route Redistribution with Type Multiple Instances Support (OSPF per virtual domain) Opaque LSA Support Database Overflow Support Simple Password Authentication MD5 authentication OSPF Hello Parameter Configuration OSPF Interface Configuration (100 maximum) OSPF NSSA Type 1 and Type 2 External Virtual Links Support April 28, 2006 14
Fortinet Inc.
3.4 Firewall
3.4.1 Protection Profile
Menus Description: FortiOS v2.80s Protection Profile renames the "Content Profile" menu option in v2.50, adds new functionality, and provides improved information consolidation for improved usability. Protection Profile provides the following profile categories under v2.80: Anti-Virus Web Filtering Web Category Filtering Spam Filtering IPS Content Archive User Groups Description: An expanded User Group function allows a User Group to be associated with a Protection Profile. This replaces the User Domain function in earlier v2.80 releases.
The new simplified method for configuring authentication groups is: 1. Configure local user 2. Configure local user group, selecting the protection profile associated with this group 3. In policy configuration when authentication is enabled, select multiple groups to the allowed authentication group
HTTP Resume Block Description: An option for the Protection Profiles is "HTTP resume block" to prevent partial downloads of files that may be used to evade the FortiGate AV scanner. This is a similar feature to blocking fragmented mail (SMTP, POP3, IMAP) messages.
3.4.2
Description: Custom TCP/IP services can now be defined for ICMP in addition to TCP and UDP. There are new predefined services for traffic types such as AOL and MSN Messenger.
3.4.3
Description: In MR8 and later, the maximum number of policy routes on FortiGate-800 models and above has been increased to 250 from 100.
3.4.4
IP Address Ranges
Description: The IP addresses for firewall policies may now be specified as a range as well as the typical subnet groupings. The range is limited to span 256 addresses. As of v2.80 MR4, this includes Encrypt (IPSec) firewall polices.
3.4.5
Multiple IP Pools
Description: Multiple IP pools per interface are now supported and for NAT-enabled policies the assigned NAT-source address is randomly selected from the IP pool rather than being limited to the IP address of the destination interface. The IP pools can also contain IP addresses belonging to subnets that are different from the subnet of the interface on which the IP pools are defined.
Increased Number of IP Pools In MR7 and later, all models now support up to a maximum of 512 IP pools for NAT firewall policies. IP pools are created with Address Groups defined in the Firewall configuration area. The previous maximum was 50 IP pools.
15
Fortinet Inc.
3.4.6
DiffServ Settings
Description: The DiffServ bits (DSCP differentiated services code/control point) of incoming and outgoing packets can be overwritten to specific values to support the QoS policies of a network. The default behaviour is to pass the DiffServ bits from source to destination packets unchanged.
3.4.7
Description: Static NAT port assignment for outbound-NAT will now always override the source port and assign the source port into upper range and thus prevent any collision-related problems for self-originated traffic.
3.4.8
SIP Support
Description: Support for Session Initiation Protocol (SIP) has been added for MR10. The following scenarios are supported: A and B: SIP terminals P: proxy
A ---- FGT ---- B, A calls B. This works in both transparent and routed modes with or without NAT enabled. A ---- FGT ---- P ---- B, A registers with P, A calls B or B calls A. This works in both transparent and routed modes with or without NAT enabled. Note that P and B must be behind the same FortiGate interface. A, B ---- FGT ---- P, A and B register with P, A calls B. This works in transparent mode only. NAT mode is not supported. Note that A and B must be behind the same FortiGate interface.
Note that VIPs are not supported, so A and B in the above scenarios can not be a VIP mapped destination.
3.5.2
Grayware Protection
Description: FortiOS v2.80 provides a new category of antivirus protection called Grayware. Grayware programs are unsolicited commercial software programs that get installed on computers, often without the user's consent or knowledge. Grayware programs are generally considered an annoyance, but these programs can cause system performance problems or be used for malicious means such as gathering personal information or surfing patterns. This feature is configurable through the Protection Profiles.
3.5.3
Description: FortiOS v2.80 allows system administrators to submit files that have been quarantined by their FortiGate units to Fortinets Threat Response Team through a simple, one-button click from the FortiGate WebUI. (Antivirus > Quarantine > Config > Enable Autosubmit, and Antivirus > Quarantine > AutoSubmit for file pattern specification.)
3.5.4
Description: In the event that log records are generated for virus and worm detection, an HTML link will be provided that points to the Fortinet virus encyclopedia definition available on the Fortinet website.
16
Fortinet Inc.
3.5.5
Description: FortiOS v2.80 release allows the system administrator to define a message that will be appended to email messages that are destined towards destinations outside of the network protected by a FortiGate unit, For example, for a law firm, this user definable message could be a disclaimer for the firm; for another firm, the message can state that this particular mail is virus free as inspected by a FortiGate Antivirus Firewall. This feature adds more flexibility to the system administrator for managing their corporate messaging policy.
3.5.6
Description: When the FortiGate is a terminating end-point to a PPTP or L2TP tunnel, the tunnel contents can now be AV scanned. This compliments the ability to scan IPSec tunnel traffic supported by previous FortiOS releases.
3.5.7
Description: On high-end models (FortiGate-3000and higher) optimisation for AV or throughput is available to achieve the best AV scanning performance. The CLI commands "config system global" > "set optimize antivirus" will optimize FortiGate operation for AV and is the system default. Note that this command will reboot the FortiGate unit.
3.5.8
Description: The ARJ compression format is now supported for antivirus scanning.
3.5.9
Description: The FortiGate Antivirus Firewall has the ability to scan compressesed files by first performing a decompression to get to the target file. A new CLI option for max uncompressed size to scan has been added to allow the administrator to specify any value, in megabytes, within the available memory range, as well as 0 for no limit.The default is 10 MB. CLI commands: conf antivirus service <http, ftp, pop3, imap, smtp> set uncompsizelimit 10 end
17
Fortinet Inc.
Note: If the required incremental updates are not available on the FDS, the full update is sent instead.Add incremental update capabilities
3.6 VPN
3.6.1 IPSec Tunnel Support in Transparent Mode
Description: FortiOS v2.80 supports IPSec VPNs constructed in Transparent mode as well as NAT or Route mode. All features of IPSec VPN that are available in NAT/Route mode except for Concentrator (hub & spoke) are available in Transparent mode.
3.6.2
Description: In FortiOS v2.80, DHCP over IPSec is supported by DHCP relay for an external DHCP server. In many remote access scenarios, a mechanism for making the remote host appear to be present on the local corporate network is useful. This may be accomplished by assigning the host a "virtual" address from the corporate network, and then tunnelling traffic via IPSec from the host's ISP-assigned address to the corporate security gateway. (Note: If the target DHCP server is on a different subnet from a FortiGate interface, a static route to the DHCP server's subnet must be manually entered into the FortiGate routing table.)
3.6.3
Description: FortiOS v2.80 supports user authentication for IPSec tunnels using RSA SecurIDTM. The user must be configured in a RADIUS server to require SecurIDTM authentication.
3.6.4
Description: Prior to MR4, firewall ENCRYPT polices for IPSec traffic had to use standard IP subnet ranges to specify the source and destination addresses. With MR4, arbitrary IP ranges are supported in the Firewall Address definition (WebUI: Firewall > Address).
3.6.5
Description: FortiOS v2.80 supports site-to-site VPN configurations in which the subnet addresses overlap between the two sides of the tunnel. Method 1: Outbound NAT Configure outbound NAT for the two subnets on two sides that have the same addressing scheme to support address overlap on the two sides. Method 2: VIP over IPSec Use VIP addresses set to the FortiGate external IP address to map the hosts on either side of the tunnel. For example, to allow host1 to access host2 in the following scenario: host1--------FG1---------FG2---host2 10.0.0.1 10.0.0.2 Set a VIP on FG1 that resolves to the host2 address, and a VIP on FG2 that points at host1. Phase 2 wildcard selectors must be selected.
3.6.6
Description: For IPSec tunnels, all traffic including Internet-bound traffic can be sent through the tunnel to the central site VPN Gateway. This allows consistent application of traffic filtering policies to be extended to the remote sites.
18
Fortinet Inc.
3.6.7
Description: Using DynDNS, IPSec VPN tunnels can be constructed even when dynamic IP addresses are being used on the termination points of the tunnel. FortiOS v2.80 provides full support for Dynamic DNS, enabling the FortiGate unit to be able to automatically register itself with a number of available Dynamic DNS services whenever the external interface IP address changes, either via a user-initiated change or through dynamic addressing schemes implemented by IP service providers.
3.6.8
Description: To better support multiple dial-up clients, IPSec Phase2 now supports a means to specify a firewall policy. To specify the firewall encryption policy source and destination IP addresses, select Specify a selector and then select the names of the source and destination addresses from the Source address and Destination address lists. You may also optionally specify source and destination port numbers and/or a protocol number. If this option is set, clients cannot propose a subnet/range selector. CLI commands: config vpn ipsec phase2 edit <phase2 name> set single-source enable end
3.6.9
Site-to-Site/Dialup Tunnels
Description: Internet browsing now is supported by site-to-site VPN tunnels (static tunnels) as well as dialup VPN tunnels.
Email content filtering support for SMTP, IMAP, and POP3 protocols Verification against DNSBL (DNS-based Black Lists) or ORDB (Open Relay Database) DNS lookup Action for spam email: providing options to Reject / Delete Support for content-based lists MIME Header Checking Reporting capabilities
DNSBL and ORDB lists act as domain name servers that match the domain of incoming email to a list of IP addresses known to send spam or allow spam to pass through. The FortiGate unit compares the IP address or domain name of the sender to any database lists you configure in sequence. If a match is found, the corresponding action is taken. If no match is found, the email is passed on to the next spam filter. (Note: The term "RBL" (Real-time Black List) is a type of DNSBL and is a registered trademark of MAPS LLC.) Reverse DNS look-up helps to counter email address spoofing by checking the SMTP mail servers reported HELO domain declaration with the result of a DNS look-up and comparing the IP address of the SMTP server. The return email address can also be checked for a valid domain with Reverse DNS look-up. Keyword and phrase lists have been improved to allow wildcards and Perl regular expressions as well as the ability to specify which part of the email message to scan (header, body, or all). A MIME headers list can be used to block or clear email from certain programs or with certain types of content. The Spam Filter compares the MIME header key-value pair of the sender to the list pair in sequence. If a match is found, the April 28, 2006 19
Fortinet Inc.
corresponding action is taken. If no match is found, the email is passed on to the next spam filter. The firewall protection profiles provide a means for applying specific anti-spam functions on a policy-by-policy basis.
3.7.2
Description: Prior to MR10, this subscription based service in the GUI is labeled FortiSpamshield the name has been updated for MR10. Please see the Special Notices section for a description on all of the subscription based services. FortiGuard Antispam is a new subscription based service for providing antispam definitions (initially DNSBL or DNSbased black lists) updates through the FortiGuard - AntiSpam servers and is supported from MR4 and later. This service is available as of 2004 - Q4. (Note: Port UDP/8889 is used by the FortiGate unit to communicate with the FortiGuard AntiSpam servers and may require further configuration of other upstream firewalls.) In MR7 and later, there are new options in the firewall protection profile and a new FortiGuard - AntiSpam configuration screen to enable serivce and cache timeout in the Spam Filter menu. Administrators can check if a domain is on the black-list through the website http://www.nospammer.net. Submissions of spam email samples can be sent to "submissions@nospammer.net". Description: FortiGuard - AntiSpam adds URL look-up to the existing IP address look-up to check for known spam sources and spam emails. The firewall protection profiles now have an option to enable FortiGuard - AntiSpam URL checking. The WebUI has a new check-box option, while the CLI adds a new command: config firewall profile edit <profile-entry> set <smtp/pop3/imap> spamfsurl end
3.8.2
Description: When a new IPS signature database is pushed to FortiGates by the FDS, IPS settings that have been altered from their default values will be overridden. MR10 introduces a new command to do one of two things. If the option is disabled, existing settings are not overridden on updates received from the FDS. If the option is enabled, which is the default setting, the new IPS signature database is pushed with Fortinet recommended settings. The following is the new command syntax: #config system autoupdate ips #set accept-recommended-settings <disable|enable> April 28, 2006 20
21
Fortinet Inc.
Description: The IDs of locally defined users now are logged when the user surfs to a web site while FortiGuard Web Filtering is enabled. The firewall already logs user IDs when FortiGuard Web Filtering is not enabled.
Configuration Change Logs Description: The logging of configuration changes has been increased. Now when a firewall policy is altered, the change is logged.
22
Fortinet Inc.
4.1.2 VPN
Description: When a dialup IPSec tunnel consist of a phase2 tunnel that contains an underscore character, the tunnel will be dropped whenever a firewall policy setting is changed. Models Affected: All. Bug ID: 31658 Status: Fixed in MR12. Description: The IPSec Phase 1 or Phase 2 keylife does not expire when using a byte count value. Models Affected: All. Bug ID: 9830 Status: Fixed in MR12. Description: DNS forwarding fails to forward DNS queries through interfaces that are members of a zone. Models Affected: All. Bug ID: 37114 Status: Fixed in MR12. Description: A hub and spoke VPN topology with the hub connected to a FortiManager would fail to allow traffic between the hub FortiGates. Models Affected: All. Bug ID: 39173 Status: Fixed in MR12.
4.1.3 System
Description: The Systems GUI erroneously displays the "Chassis" option. This feature is not supported on the FGT5002 blade. Models Affected: FGT_5002 Bug ID: 33544 Status: Fixed in MR12. Description: Microsoft Netmeeting fails to setup the connection when messages are received at the FortiGate on a VIP. Models Affected: All. Bug ID: 35478 Status: Fixed in MR12.
23
Fortinet Inc.
24
Description: Using the GUI to delete an SNMP host in a community deletes the hosts below it. Models Affected: All. Bug ID: 23767 Status: Fixed in MR10. Description: In an HA cluster configuration certain MIB OID locations sometimes do not respond to SNMP GET queries: memory, cpu, and sessions. Workaround is to view the information via the WebUI or CLI. Models Affected: FortiGate-3600. Bug ID: 22766 Status: Fixed in MR10. Description: To prevent XSS (cross site scripting) vulnerabilities, certain characters are disallowed in most CLI and WebUI fields. The Web Pattern Block field does currently not allow the following characters: < > ( ) # " ' Models Affected: All running v2.80-MR7 and MR8. Bug ID: 23374 Status: Fixed in MR10. Description: A Nessus-DOS attack would cause the CPU to spike and remain high even after the attack had stopped. Models Affected: All. Bug ID: 27249 Status: Fixed in MR10. Description: An interface sent an IPChange trap when the interface was brought up and down. Even if the IP address did not change, a trap would be sent. Models Affected: All. Bug ID: 18280 Status: Fixed in MR9. Description: The LCD misformats the information. When the firewall's operational mode is changed through the LCD, the confirmation message is misformatted. Models Affected: All models with an LCD. Bug ID: 19138 Status: Fixed in MR9. Description: The daylight savings time option causes the update daemon to restart. If the option is enabled while in the daylight savings time period the update daemon restarts. Models Affected: All. Bug ID: 24339 Status: Fixed in MR9.
4.2.2 WebUI
Description: When the FortiGate firewall is in HA mode, users are not able to access the quarantine page from neither Mozilla nor from Internet Explorer. Models Affected: All. Bug ID: 33362 Status: Fixed in MR11. Description: If a log file from a slave unit in an HA cluster was downloaded, the file name was "fetch". It has been changed to reflect the type of log being downloaded, such as "tlog", "elog", etc. Models Affected: All. Bug ID: 24181 Status: Fixed in MR10. Description: When more than 20 static VPN tunnels were configured, any connected dialup VPN tunnel would not appear in the VPN > IPSec > Monitor page. Models Affected: All. Bug ID: 23140 Status: Fixed in MR10. Description: 21497 Fields related to FortiLog encryption were not being displayed correctly when the encryption option was being enabled and disabled.
25
Fortinet Inc.
21953 The firewall would not allow an Xauth server to be setup on a dialup VPN Phase1 gateway, if the user group included a RADIUS and LDAP server. 21254 The GUI inadvertently displayed the DHCP-IPSec option in the IPSec VPN Phase2 configuration when Dynamic DNS is chosen for the remote gateway. Models Affected: All. Bug ID: 21497, 21953, 21254 Status: Fixed in MR9.
4.2.3
HA
Description: When in HA mode, 10.0.0.0/24 routes can not be added to the routing table. Models Affected: All. Bug ID: 31276 Status: Fixed in MR11. Description: When a new NIDS signature is installed on the FortiGate Firewall master, the slave firewall(s) will reboot once. Models Affected: All Bug ID: 33489 Status:Fixed in MR11. Description: FortiGate 60 firewalls running in HA mode erroneously permit users to enable the internal port as a monitored port. The internal interface is a switch port, so is restricted by design from being a monitored port. Models Affected: All Bug ID: 30162 Status:Fixed in MR11. Description: High availabilty is not supported on the FG1000A and FG1000AFA2 firewalls. Models Affected: FG1000A/FG1000AFA2 Bug ID: 34553 Status:Fixed in MR11. Description: Slave units in a three or more HA AA cluster using weighted round robin, would stop receiving sessions from the master unit. Models Affected: All. Bug ID: 23086 Status: Fixed in MR10. Description: In Transparent mode, HA Active-Active mode, the firewall cluster forwards multicast and broadcast packets. The cluster can receive these packet types at the same time and both the master and slave can forward them at the same time. This will confuse the switch because of the identical source MAC address on the packet. Models Affected: All. Bug ID: 23873 Status: Fixed in MR9 Description: When adding a new member to a HA cluster, the normal operation involves synchronizing the unit configuration followed by a system reboot of the new member. However, if the synchronization fails the slave will continuously reboot as it repeatedly attempts to synchronize the configuration. This can occur if a configuration change is made on the master when the HA link to the slave is down. Models Affected: All. Bug ID: 20530 Status: Fixed in MR9.
4.2.4
Router
Description: The policy routing feature does not automatically forward traffic through alternative routes when an associated route is removed. Models Affected: All Bug ID: 32302 Status:Fixed in MR11. Description: When a gateway address is not configured, policy routes for OSPF discovered routes do not work. Models Affected: All Bug ID:29938 Status:Fixed in MR11.
26
Fortinet Inc.
Description: Static routes with administrative distances of 128 or more would disappear from the routing table and would not be visible in GUI > Router > Monitor. Models Affected: All. Bug ID: 24263 Status: Fixed in MR10. Description: Some FTP clients running in FTP Active mode would hang when being routed through the firewall using a policy route. Models Affected: All. Bug ID: 21451 Status: Fixed in MR9. Description: Once RIP Split Horizon was enabled it could not be disabled. Both Split Horizon and Poison Reverse work if they are enabled together. Models Affected: All. Bug ID: 20625 Status: Fixed in MR9.
4.2.5
Firewall
Description: Using a blank field in the Common Name Identifier field allows all users defined in a Windows Active Directory to be authenticated, regardless of their position within the AD structure. If the Common Name Identifier field in an LDAP user is left blank, upon upgrading from FortiOS v2.80 MR9 to FortiOS v2.80 MR10, the field is filled in with "cn", which causes authentication attempts to fail if the above method is used. Models Affected: All. Bug ID: 29104 Status: Fixed in MR11. Description: In Route mode for non peer-to-peer H323 VoIP communication, the control session for a non-natted policy expiration time decreases even if there is some RTP traffic passing through the device linked with this session. Models Affected: All. Bug ID: 0027939 Status: Fixed in MR11. Description: H323 sessions use the odd port numbers for RTP traffic. Models Affected: All. Status: Fixed in MR11. Bug ID: 31714 Description: Non-NAT policy expiration time decreases even if there is RTP traffic passing through the device linked with the control session. Models Affected: All. Bug ID: 27939 Status: Fixed in MR11. Description: When a H.323 session is created, the H.323 session-helper modifies the source port of H.323 traffic. Models Affected: All. Bug ID: 32644 Status: Fixed in MR11. Description: When a user attempts to establish a SIP session through the FortiGate firewall, the SIP session-helper modifies the source port of the invite message header. Models Affected: All. Bug ID: 31814 Status: Fixed in MR11. Description: Microsoft NetMeeting call setup was not handled properly, thus resulting in failed calls. Models Affected: All. Bug ID: 20746 Status: Fixed in MR10. Description: In previous builds of FortiOS, the required session-helpers for SIP/H.323 were setup automatically when the image was upgraded not TFTP upgraded. However, changes to the CLI in later builds required users to add the sessionhelpers manually if the image was upgraded. TFTP upgrades are unaffected. Models Affected: All. Bug ID: 26627 Status: Fixed in MR10.
27
Fortinet Inc.
Description: When a firewall policy had authentication enabled and IM blocking enabled, IM would not be blocked. Models Affected: All. Bug ID: 25669 Status: Fixed in MR10. Description: Static NAT VIPs added after upgrading to FortiOS v2.80 MR9 do not work until the configuration is re-written. For example, 1. configure static NAT VIP 2. add static NAT VIP to firewall policy 3. re-apply any other existing setting in the current configuration, such as a firewall address VIPs that exist prior to upgrade are not affected. Models Affected: FortiGate300 and above. Bug ID: 24225
Description: HTTP Authentication through the firewall fails if the user name contains special characters. FTP and TELNET did not observe the same behaviour. Models Affected: All. Bug ID: 20118 Status: Fixed in MR9. Description: The firewall inadvertently switched any UDP Port Forwarding VIP to a TCP Port Forwarding VIP. Models Affected: All. Bug ID: 21386 Status: Fixed in MR9.
4.2.6
FortiGuard
Description: Duplicate emails are received when DATAZ extensions are used by email servers. Models Affected: All. Bug ID: 29773 Status: Fixed in MR11.
4.2.7
VPN
Description: When users make non-IPSec related configuration changes, established IPSec tunnels are dropped. Models Affected: All. Bug ID: 32795 Status: Fixed in MR11. Description:When an interface is configured with a secondary IP address, VPN tunnels traffic for the primary IP address are not sent nor received. Models Affected: All. Bug ID: 30472 Status: Fixed in MR11. Description: On a FortiGate 200A firewall, users are not able to create PPTP sessions over unnumbered PPPoE interfaces. Models Affected: 200A Status: Fixed in MR11. Bug ID: 29881 Description: When the FortiGate 300 firewall is used as a VPN hub, tunnels between each of it's spokes go down unexpectedly. Models Affected: 300 Bug ID: 31628 Status: Fixed in MR11. Description: An IPSec tunnel between two FortiGate units would be brought down if a PPTP connection was attempted from a PC to one of the FortiGate units. Models Affected: All. Bug ID: 21384 Status: Fixed in MR9.
28
Fortinet Inc.
4.2.8
IPS
Description: When a "Syn Fin" packet is received on the FortiGate firewall, the firewall forwards one packet before dropping the next ones. Models Affected: All. Bug ID: 26628 Status: Fixed in MR11. Description: The IPS engine is not able to block traffic sent by Skype versions 1.3.066 and 1.4 beta. Models Affected: All. Bug ID: 32767 Status: Fixed in MR11. Description: The P2P > skype IPS signature found in the GUI under IPS > Signature > Predefined > p2p > skype does not block Skype IM sessions when the action is set to "drop session" or "clear session". Models Affected: All. Bug ID: 23125 Status: Fixed in MR11. Description: Changes made to IPS signatures are not saved upon a restore of the configuration file or an upgrade. For example, if you change the action on the "AskSam.as_web.Access " signature in the iss group from Pass to Drop Session, backup the configuration, upgrade the firewall, and then restore the configuration, the changes are not saved. Models Affected: All. Bug ID: 25636 Status: Fixed in MR10. Description: The IPS Engine would stop running when the firewall reached a high memory usage scenario. Models Affected: All. Bug ID: 29712 Status: Fixed in MR10.
4.2.9
Description: Content logging may drop the first character of the From, To, and Subject header fields (RFC2822 Internet Message Format) if they contain no space after the colon (:) eliminator. Models Affected: All. Bug ID: 28194 Status: Fixed in MR11. Description: Log files greater than 300megs can not be searched on the slave FortiGate firewall. Models Affected: All. Bug ID: 28897 Status: Fixed in MR11. Description: The FortiGate firewall is unable to uploaded logs files via FTP if the FTP server the FortiGate firewall contacts goes down and comes back up at a later time. Models Affected: All. Bug ID: 29471 Status: Fixed in MR11. Description: When an interface goes down, the FortiGate firewall logs the event as belonging to the "informational" category instead of the "warninig" category. Models Affected: All. Bug ID: 20599 Status: Fixed in MR11. Description: The firewall alert mail function may fail to authenticate with some mail servers. Models Affected: All. Bug ID: 21168 Status: Fixed in MR9. Description: In the log file upload settings, the firewall uploads the log file with an incorrect file name. The uploaded log file has yyyymmdd as part of the file name. The firewall was using the incorrect month. Models Affected: All. Bug ID:21354 Status: Fixed in MR9.
29
Fortinet Inc.
4.2.11 Antivirus
Description: In previous builds of FortiOS, splice for SMTP would be enabled when antivirus scanning was enabled. This has changed for MR10. SMTP splice can be disabled when antivirus scanning is enabled. Please see the Special Notes section for more information FTP and SMTP Splice. Models Affected: All. Bug ID: 21480 Status: Fixed in MR10. Description: The "Web Resume Download Block" feature was not working. The download would resume from where it stopped rather than from the start of the file again. Models Affected: All. Bug ID: 23821 Status: Fixed in MR10. Description: When the FortiGate reaches a low memory condition, the "system global av_failopen" antivirus feature determines how sessions are handled. There are three options for this feature: off connections are received and handled regardless of the free memory one-shot connections bypass the AV engine and the administrator must manually change the setting to off or pass in order to resume AV scanning pass connections bypass the AV engine and AV scanning resumes when the low memory condition is resolved The default option for this feature is pass. In previous builds it was set to off. Models Affected: All. Bug ID: no bug Status: Fixed in MR10. Description: The firewall does not block oversized files through FTP when AV was enabled. If the downloaded file is larger than the threshold, the firewall would not block the file. Models Affected: All. Bug ID: 18431 Status: Fixed in MR9. Description: The details of the Content Archive (System > Status) displayed misformatted IP addresses. Models Affected: All. Bug ID: 21415 Status: Fixed in MR9.
30
Fortinet Inc.
5.2 IPS
Description: The default settings of some IPS signatures were changed in IPS database version 2.211. The following is a list of the signatures that changed. If your firewall is using an IPS database version that is older than 2.211 and you upgrade to MR10, which has an IPS database version of 2.216, then the following signatures will change. You must manually change them if you wish to enable them. Please see the IPS sub-section of the Enhancements Provided by FortiOS v2.80 MR10 section for a command to prevent the settings from being overwritten by future IPS signature updates. Signatures which have been disabled by default CyberKit.2.2 SMB.DCERPC.SamrEnumerateAliasesInDomain.139 Private.Access.UDP ip_decoder:ipv4_bad_checksum dns_decoder:invalid_pointer dns_decoder:invalid_opcode dns_decoder:invalid_param CyberKit.2.2 SMB.DCERPC.SamrEnumerateAliasesInDomain.139 http_decoder:double_encoding tcp_decoder:tcp_bad_checksum im:aim im:msn im:yahoo im:qq pop_decoder:nested_request pop_decoder:unknown_cmd pop_decoder:unknown_reply smtp_decoder:nested_request smtp_decoder:unknown_cmd smtp_decoder:unknown_reply imap_decoder:unknown_cmd imap_decoder:unknown_reply udp_decoder:udp_bad_checksum Private.Access.UDP Anamolies whose threshold have been changed icmp_src_session (100 => 200) tcp_src_session (2000 => 5000) udp_src_session (1000 => 5000)
31
Status: None.
5.3 VPN
Description: When an IPSec dial-up client is using an address group for the source address, the FortiGate VPN Gateway firewall policy applies only to the last entry in the dial-up client address group. e.g. On the FortiGate dial-up server, the encrypt policy source-to-destination is: 192.168.2.0->all. On dialup client: 192.168.4.0+192.168.22.0 (address group)->192.168.2.0. Then, the resulting dial-up encrypt firewall policy is: 192.168.2.0-> 192.168.22.0 Models Affected: All. Bug ID: 13786 Status: Fix in a future release. Workaround: Create a dedicated tunnel on the VPN Gateway just for this client (with a matching policy), or make the client initiate separate tunnels for each address subnet. Description: When a dialup VPN connection is made to a FortiGate firewall, the phase 2 SA's timer is not reset automatically when there is still an active session. Models Affected: All. Bug ID: 33295 Status: Fix in a future release. Workaround: Enable phase2 keepalive on the VPN dialup client.
5.4 System
Description: FortiOS v2.80 introduced the Access Profile feature. Since FortiOS v2.50 does not support this feature, upon upgrading some administrator accounts are lost. For every admin user in FortiOS v2.50, the upgrade procedure creates a new Access Profile and since only a certain number of Access Profiles are configurable per FortiGate (8, 16, or 64 depending on the model), admin users beyond these limits are not retained in the upgrade. Models Affected: All. Bug ID: 25201 Status: Fix in a future release. Description: When the FortiGate firewall non-reserved IP pool is used up, the FortiGate firewall will assign reserved IP addresses to requesting DHCP clients. Models Affected: All. Bug ID: 31376 Status: Fix in a future release.
5.5 Router
Description: When a FortiGate running RIPv2 has a passive interface, authentication enabled, and a neighbour configured, no authentication information is contained in any of the RIPv2 packets. Models Affected: All. Bug ID: Status: Fix in a future release.
5.6 Antivirus
Description: Files that have Japanese characters in the filename are not blocked by the FortiGate firewall. Models Affected: All. Bug ID: 32369 Status: Fix in a future release. Description: When an infected file has Japanese characters in the filename, the FortiGate firewall will send a replacement message and replace the name of the file with a series of "?". Models Affected: All.
32
33
Fortinet Inc.