FortiSwitchOS 7.4.2 Release Notes

Introduction

This document provides the following information for FortiSwitchOS 7.4.2 build 0801:

See the Fortinet Document Library for FortiSwitchOS documentation.

Supported models

FortiSwitchOS 7.4.2 supports the following models:

Model SeriesSupported Models
FortiSwitch 1xxFS-108E, FS-108E-POE, FS-108E-FPOE, FS-108F, FS-108F-POE, FS-108F-FPOE, FS-124E, FS-124E-POE, FS-124E-FPOE, FS-124F, FS-124F-POE, FS-124F-FPOE, FS-148E, FS-148E-POE, FS-148F, FS-148F-POE, FS-148F-FPOE
FortiSwitch 2xxFS-224D-FPOE, FS-224E, FS-224E-POE, FS-248D, FS-248E-POE, FS-248E-FPOE
FortiSwitch 4xxFS-424E, FS-424E-POE, FS-424E-FPOE, FS-424E-Fiber, FS-M426E-FPOE, FS-448E, FS-448E-POE, FS-448E-FPOE
FortiSwitch 5xxFS-524D, FS-524D-FPOE, FS-548D, FS-548D-FPOE
FortiSwitch 6xxFS-624F, FS-624F-FPOE, FS-648F, FS-648F-FPOE
FortiSwitch 1xxxFS-1024D, FS-1024E, FS-1048E, FS-T1024E
FortiSwitch 2xxxFS-2048F
FortiSwitch 3xxxFS-3032E
FortiSwitch RuggedFSR-112D-POE, FSR-124D, FSR-424F-POE

What's new in FortiSwitchOS 7.4.2

Release 7.4.2 provides the following new features:

Refer to the FortiSwitch feature matrix for details about the features supported by each FortiSwitch model.

Special notices

Zero-touch management

When a new FortiSwitch unit is started, by default, it will connect to the available manager, which can be a FortiGate device, FortiLAN Cloud, or FortiSwitch Manager. All ports are enabled for auto discovery. The "internal" interface is the DHCP client in all FortiSwitch models. If you do not want your FortiSwitch unit to be managed, you must disable the features that you do not want active.

By default, auto-network is enabled in FortiSwitchOS 7.2.0 and later

After an execute factoryreset command is executed on a FortiSwitch unit in standalone mode, the auto-network configuration is enabled by default. If you are not using auto-network, you must manually disable it:

config switch auto-network
set status disable
end

Downgrading FortiSwitchOS 7.0.0 and later to versions earlier than 6.2.6 or 6.4.4 is not supported

Downgrading FortiSwitchOS 7.0.0 and later to FortiSwitchOS 6.2.6 and later 6.2 versions is supported. Downgrading FortiSwitchOS 7.0.0 and later to FortiSwitchOS 6.4.4 and later 6.4 versions is supported. Downgrading FortiSwitchOS 7.0.0 to versions earlier than FortiSwitchOS 6.2.6 or 6.4.4 is not supported.

Downgrading your FortiSwitchOS version requires converting the admin password format first

Before downgrading to a FortiSwitchOS version earlier than 7.0.0, you need to ensure that the administrator password is in SHA1 format. Use the execute system admin account-convert-sha1 <admin_name> command to convert the administrator password to SHA1 encryption.

Before downgrading to FortiSwitchOS 7.0.0 or later, you need to ensure that the administrator password is in SHA1 or SHA256 format.

Important: If you do not convert the admin password before downgrading, the admin password will not work after the switch reboots with the earlier FortiSwitchOS version. ⚠️

To convert the format of the admin password to SHA1 format:

  1. Enter the following CLI command to convert the admin password to SHA1 encryption:
    execute system admin account-convert-sha1 <admin_name>
  2. Downgrade your firmware.

To convert the format of the admin password to SHA256 format:

  1. Enter the following CLI command to convert the admin password to SHA256 encryption:
    execute system admin account-convert-sha256 <admin_name>
  2. Downgrade your firmware.

Connecting multiple FSR-112D-POE switches

The FSR-112D-POE switch does not support interconnectivity to other FSR-112D-POE switches using the PoE ports. Fortinet recommends using the SFP ports to interconnect switches.

Upgrade information

FortiSwitchOS 7.4.2 supports upgrading from FortiSwitchOS 3.5.0 and later.

For the FS-424E, FS-424E-POE, FS-424E-FPOE, FS-424E-Fiber, and FS-M426-FPOE models, there is a two-step upgrade process if you are upgrading from FortiSwitchOS 6.0.x or 6.2.x to 7.2.x:

  1. Upgrade from FortiSwitchOS 6.0.x or 6.2.x to FortiSwitchOS 6.4.12 or later.
  2. Upgrade from FortiSwitchOS 6.4.12 or later to 7.2.x.

? If you do not follow the two-step upgrade process, the FortiSwitch unit will not start after the upgrade, and you will need to use the serial console to conclude the upgrade (BIOS and OS).

For FortiSwitch units managed by FortiGate units, refer to the FortiLink Release Notes for upgrade information.

Product integration and support

FortiSwitchOS 7.4.2 support

The following table lists FortiSwitchOS 7.4.2 product integration and support information.

CategoryDetails
Web browser
  • Mozilla Firefox version 52
  • Google Chrome version 56

Other web browsers may function correctly, but are not supported by Fortinet.

FortiOS (FortiLink Support)Refer to the FortiLink Compatibility table to find which FortiSwitchOS versions support which FortiOS versions.

Resolved issues

The following issues have been fixed in FortiSwitchOS 7.4.2. For inquiries about a particular bug, please contact Customer Service & Support.

Bug IDDescription
703374The link does not come up when using SP-CABLE-FS-SFP+3 or SP-CABLE-FS-SFP+5.
760843802.1x MAC Authentication Bypass (MAB) switch sessions are not reauthenticated on port4 of a FS-108E.
845706The output of the diagnose switch-controller switch-info 802.1x command differs.
889987When the port descriptions are too long, a “500 Internal Server Error” is reported.
927820The FortiOS event log does not include the source IP address when a security scanning tool is used.
927850The following are the maximum numbers of saved configuration revisions:
  • 1xx-2xx: 20 revisions
  • 4xx-6xx: 40 revisions
  • 1xxx-3xxx: 80 revisions
934041The DHCP-snooping performance needs to be improved on the FS-1xxE and FS-1xxF models.
935918The VOIP phone and PC connectivity needs to be stable.
939257If you set the sample-direction to tx or both, the output of the get system flow-export-data flows all command might be wrong.
950123The HTTP and HTTPS daemon randomly returns “Forbidden" error pages on the FS-548D-FPOE model.
950325The FS-424E model runs out of memory and stops working until the switch is restarted.
958254After being upgraded to the FortiSwitchOS 7.4.1 GA build, the FortiSwitch unit still displays the "Caution: This firmware failed signature verification!” error.
958507When using FS-2xx or FS-4xx models, OSPF multicast hello packets from the FortiGate device do not reach third-party switches.
961041802.1X authentication does not work when the Windows client is used with the FortiGate local database and FIPS.
961512The System > FortiLAN Cloud page displays "Invalid License,” even though the FortiSwitch unit is using the Cloud Advanced Management License.
963375The FortiGate device cannot discover the FS-1xxE and FS-1xxF models.
965182MAB events are rejected when using 802.1X authentication, FortiLink, LLDP voice VLAN, MAB, and a phone.
965511If the internal system interface has the default DHCP gateway enabled and the default route is added to the hardware, IP multicast packets are looped across MCLAG routers.
965640There are random fan alarms for the FS-4xx models.
967568There is a broadcast/multicast storm while an MCLAG peer is booting up.
967931A managed FSW-448E-FPOE went offline because of a memory leak.

Known issues

The following known issues have been identified with FortiSwitchOS 7.4.2. For inquiries about a particular bug or to report a bug, please contact Fortinet Customer Service & Support.

Bug IDDescription
382518, 417024, 417073, 417099, 438441DHCP snooping and dynamic ARP inspection (DAI) do not work with private VLANs (PVLANs).
414972IGMP snooping might not work correctly when used with 802.1x Dynamic VLAN functionality.
480605When DHCP snooping is enabled on the FSR-112D-POE, the switched virtual interface (SVI) cannot get the IP address from the DHCP server.
Workarounds:
  • Use a static IP address in the SVI when DHCP snooping is enabled on that VLAN.
  • Temporarily disable DHCP snooping on the VLAN and then use the execute interface dhcpclient-renew <interface> command to renew the IP address. After the SVI gets the IP address from the DHCP server, you can enable DHCP snooping.
510943The time-domain reflectometer (TDR) function (cable diagnostics feature) reports unexpected values.
Workaround: When using the cable diagnostics feature on a port (with the diagnose switch physical-ports cable-diag <physical port name> CLI command), ensure that the physical link on its neighbor port is down. You can disable the neighbor ports or physically remove the cables.
542031For the FS-5xx switches, the diagnose switch physical-ports led-flash command flashes only the SFP port LEDs, instead of all the port LEDs.
548783Some models support setting the mirror destination to "internal.” This is intended only for debugging purposes and might prevent critical protocols from operating on ports being used as mirror sources.
572052Backup files from FortiSwitchOS 3.x that have 16-character-long passwords fail when restored on FortiSwitchOS 6.x. In FortiSwitchOS 6.x, file backups fail with passwords longer than 15 characters.
Workaround: Use passwords with a maximum of 15 characters for FortiSwitchOS 3.x and 6.x.
585550When packet sampling is enabled on an interface, packets that should be dropped by uRPF will be forwarded.
606044, 610149The results are inaccurate when running cable diagnostics on the FS-108E, FS-124E, FS-108E-POE, FS-108E-FPOE, FS-124E-POE, FS-124E-FPOE, FS-148E, and FS-148E-POE models.
609375The FortiSwitchOS supports four priority levels (critical, high, medium, and low); however, The SNMP Power Ethernet MIB only supports three levels. To support the MIB, a power priority of medium is returned as low for the PoE MIB.
659487The FS-108E, FS-108E-POE, FS-108E-FPOE, FS-108F, FS-108F-POE, FS-108F-FPOE, FS-124E, FS-124E-POE, FS-124E-FPOE, FS-124F, FS-124F-POE, and FS-124F-FPOE, FS-148E, and FS-148E-POE models support ACL packet counters but not byte counters. The get switch acl counters commands always show the number of bytes as 0.
867079For the FSR-112D-POE model:
  • If you have enabled IGMP snooping or MLD snooping, the FortiSwitch unit does not support IPv6 features and cannot pass IPv6 protocol packets transparently.
  • If you want to use IGMP snooping or MLD snooping with IPv6 features, you need to enable set flood-unknown-multicast under the config switch global command.
673433Some 7-meter direct-attach cables (DACs) cause traffic loss for the FS-448E model.
748210The MAC authentication bypass (MAB) sometimes does not work on the FS-424E when a third-party hub is disconnected and then reconnected.
777647
  • When MACsec is enabled on a tagged port, the set exclude-protocol command does not work on packets with VLAN tags (ARP, IPv4, or IPv6).
  • If you use the set exclude-protocol command with dot1q and packets with VLAN tags (ARP, IPv4, or IPv6), the packets are not MACsec encrypted and are transmitted as plain text.
  • Only 0x88a8 type packets apply to qinq.
784585When a dynamic LACP trunk has formed between switches in an MRP ring, the MRP ring cannot be closed. Deleting the dynamic LACP trunk does not fix this issue. MRP supports only physical ports and static trunks; MRP does not support dynamic LACP trunks.
Workaround: Disable MRP and then re-enable MRP.
793145VXLAN does not work with the following:
  • log-mac-event
  • DHCP snooping
  • LLDP-assigned VLANs
  • NAC
  • Block intra-VLAN traffic
828603The oids.html file is not accurate.
829807eBGP does not advertise routes to its peer by default unless the set ebgp-requires-policy disable command is explicitly configured or inbound/outbound policies are configured.
867108Depending on your browser type/version, web UI access might fail when using TLS 1.3 and client certificate authentication.
Workaround: Use TLS 1.2.
882480When the set switch-controller-access-vlan command is enabled on the FortiGate device, any host in the access VLAN cannot ping its default gate in the FortiGate device.
903001Do not use mgmt as the name of a switch virtual interface (SVI). mgmt is reserved for the physical management switch port.
916405FortiSwitchOS should not allow MACsec and 802.1X authentication to be configured on the same port.
940248When both network device detection (config switch network-monitor settings) and the switch controller routing offload are enabled, the FS-1048E switch generates duplicate packets.
950895In Release 7.4.1, VXLAN supports only one MSTP instance.
940586, 958210For the FS-148F, FS-148F-POE, and FS-148F-FPOE models, there might be packet loss after the packet sampler or packet capture is enabled.
974147The auto-module speed does not work on the FSR-424F-POE model for FN-TRAN-SFP2-LX.
Workaround: Set the speed to 1000auto or 1000full to bring up the link.

PDF preview unavailable. Download the PDF instead.

FortiSwitchOS-7.4.2-Release-Notes madbuild

Related Documents

Preview FortiSwitchOS 7.2.6 Release Notes
This document provides release notes for FortiSwitchOS 7.2.6, detailing new features, supported models, special notices, upgrade information, product integration, resolved issues, and known issues.
Preview FortiSwitchOS 7.6.1 Release Notes
Release notes for FortiSwitchOS version 7.6.1, detailing new features, resolved issues, known issues, and upgrade information for Fortinet FortiSwitch devices.
Preview FortiSwitch Secure Access Family Data Sheet
This data sheet provides comprehensive information on the FortiSwitch Secure Access Family, detailing its security, performance, and manageability features. It covers various models, their specifications, deployment options, and order information, highlighting integration with FortiGate for SD-Branch and other network environments.
Preview FortiSwitch Ordering Guide - Fortinet Network Switches
This guide provides detailed ordering information for Fortinet's FortiSwitch product line, covering various models for retail, branch, campus, data center, and industrial environments. It includes specifications, port configurations, power supply options, and transceiver compatibility.
Preview FortiSwitch Secure Access Family Data Sheet
This data sheet provides detailed specifications and features of the FortiSwitch Secure Access Family, including various models like 108E, 124E, 148E, 224D, 224E, 248D, 248E, 424D, 424E, 448D, 524D, 548D, and their PoE variants. It highlights their integration with FortiGate via FortiLink for centralized management, security fabric capabilities, and performance metrics.
Preview FortiSwitchOS 7.4.4 Administration Guide: Standalone Mode Configuration
Comprehensive guide for administering FortiSwitch units in standalone mode with FortiSwitchOS 7.4.4. Covers system configuration, network management, port settings, security, and advanced features.
Preview FortiSwitch Secure Access Family: Secure, Scalable Ethernet Networking
The Fortinet FortiSwitch™ Secure Access family provides robust Ethernet switching solutions designed for enterprise branch offices and small businesses. This series offers an unparalleled combination of security, ease of use, and scalability, making it an ideal choice for modern network infrastructure. Key features include seamless integration with FortiGate firewalls via FortiLink, zero-touch deployment, intuitive management, and cost-effective Network Access Control (NAC). FortiSwitch also supports Secure Access Service Edge (SASE) principles, user- and device-based access control, and offers Power over Ethernet (PoE+) capabilities for powering connected devices. With wire-speed switching and high-speed uplinks, FortiSwitch ensures performance for demanding applications.
Preview FortiSwitch Secure Access Series Data Sheet
FortiSwitch Secure Access switches offer a secure, simple, and scalable Ethernet solution with outstanding security, performance, and manageability for small to mid-sized businesses, distributed enterprises, and branch offices. Integrated with the FortiGate Network Security Platform, these switches provide centralized management and visibility.