Jump to content
  • SeedTheNet
  • FortiOS 7.0.15 Resolved Issues


    SeedTheNet

    We are pleased to inform you that Fortinet has released the latest update for FortiOS 7.0, version 7.0.15. This update brings a range of enhancements, optimizations, and security updates to further strengthen your network infrastructure's resilience and performance.

    Key highlights of the FortiOS 7.0.15 update include:

    Resolved issues

    7.0.15 
     The following issues have been fixed in version 7.0.15. To inquire about a particular bug, please contact Customer Service & Support.

    Application Control

    Bug ID

    Description

    952307

    FG-400F sees increased packet loss when using an application list in the policy.

    FortiGate 6000 and 7000 platforms

    Bug ID

    Description

    949175

    During FIM failover from FIM2 to FIM1, the NP7 PLE sticks on a cache invalidation, stopping traffic.

    HA

    Bug ID

    Description

    869557

    Upgrading or re-uploading an image to the HA secondary node causes the OS to be un-certified.

    1011674

    Upgrading from 7.0.14 GA to 7.2.8 GA from an HA secondary node fails with BIOS security level 2. The new image is unrecognized as un-certified and aborts the upgrade process. The HA cluster is unaffected.

    Hyperscale

    Bug ID

    Description

    936747

    Connections per second (CPS) performance of SIP sessions accepted by hyperscale firewall policies with EIM and EIF disabled that include overload with port block allocation (PBA) GCN IP pools is lower than expected.

    949188

    ICMP reply packets are dropped by FortiOS in a NAT64 hyperscale policy.

    961684

    When DoS policies are used and the system is under stress conditions, BGP might go down.

    976972

    New primary can get stuck on failover with HTTP CC sessions.

    Intrusion Prevention

    Bug ID

    Description

    968367

    IPS engine high memory usage can cause FortiOS to go into conserve mode.

    Limitations

    Bug ID

    Description

    961992

    The buffer and description queue limitation of Marvell switch ports causes a performance limitation.

    Routing

    Bug ID

    Description

    935370

    SD-WAN performance SLA tcp-connect probes clash with user sessions.

    Security Fabric

    Bug ID

    Description

    887967

    Fabric crashes when synchronizing objects with names longer than 64 characters.

    988526

    Address object changes from the CLI of the root FortiGate in Security Fabric are not synchronized with downstream devices.

    SSL VPN

    Bug ID

    Description

    821240

    SSLVPNVD 11 signal failure due to attempt to read out of bounds memory.

    System

    Bug ID

    Description

    828557

    FortiGate as DHCP relay is not showing a DHCP decline in the debugs when there is an IP conflict in the network.

    888941

    Some sessions are still reported as offloaded when auto-asic-offload is disabled.

    910829

    Degraded traffic bandwidth for download passing from 10G to 1G interfaces.

    937500, 969083

    FortiOS does not accept an installation script from FortiManager when creating an extender-profile with login-password-change is set to yes.

    938449

    In the 4.19 kernel, when a neighbor's MAC is changed, the session and IPsec tunnel cannot be flushed from the NPU.

    943090

    Buffer and description queue limitation of Marvell switch port will cause a performance limitation.

    949481

    The tx_collision_err counter in the FortiOS CLI keeps increasing on both 10G SFP+ X1 and X2 interfaces.

    956107

    On the FortiGate 400F and 600F, the buffer and description queue limitation of the Marvell switch port causes a performance limitation.

    984696

    Network usage is not accurately reported by the get system performance status command.

    986698

    The NP7 should use the updated MAC address from the ARP table to forward traffic to the destination server.

    1001938

    Support Kazakhstan time zone change to a single time zone, UTC+5.

    User & Authentication

    Bug ID

    Description

    1000108

    Guest-management administrators cannot see or print guest user passwords in plain text; the password is masked as ENC XXXX string.

    WiFi Controller

    Bug ID

    Description

    821320

    FG-1800F drops wireless client traffic in L2 tunneled VLAN with capwap-offload enabled.

     

    We strongly recommend applying this update to your Fortinet devices to benefit from the latest features, security enhancements, and performance optimizations. Keeping your systems up to date is crucial in maintaining a secure and efficient network environment.

    For more information about the update process, release notes, and support resources, please visit the Fortinet Support Portal or reach out to Fortinet dedicated support team for assistance.

    • Like 1

    User Feedback

    Recommended Comments

    There are no comments to display.



    Create an account or sign in to comment

    You need to be a member in order to leave a comment

    Create an account

    Sign up for a new account in our community. It's easy!

    Register a new account

    Sign in

    Already have an account? Sign in here.

    Sign In Now

  • Member Statistics

    40
    Total Members
    60
    Most Online
    fluoxetine cost
    Newest Member
    fluoxetine cost
    Joined


×
×
  • Create New...

Important Information

Privacy Policy