FortiOS Release Notes

FortiOS

FortiOS, 7.6.2, Release Notes

Fortinet Inc.

FortiOS Release Notes

3 days ago — END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA ... This maintains network connectivity without the need to use manual steps. 1 ...

12 февр. 2025 г. — FortiGate virtual machines (VMs) are not constrained by memory size and will continue to support all available features after upgrading to FortiOS 7.6.0.

PDF preview unavailable. Download the PDF instead.

fortios-v7.6.2-release-notes
Release Notes
FortiOS 7.6.2

FORTINET DOCUMENT LIBRARY https://docs.fortinet.com FORTINET VIDEO LIBRARY https://video.fortinet.com FORTINET BLOG https://blog.fortinet.com CUSTOMER SERVICE & SUPPORT https://support.fortinet.com FORTINET TRAINING & CERTIFICATION PROGRAM https://www.fortinet.com/training-certification FORTINET TRAINING INSTITUTE https://training.fortinet.com FORTIGUARD LABS https://www.fortiguard.com END USER LICENSE AGREEMENT https://www.fortinet.com/doc/legal/EULA.pdf FEEDBACK Email: techdoc@fortinet.com
February 4, 2025 FortiOS 7.6.2 Release Notes 01-762-1114584-20250204

TABLE OF CONTENTS

Change Log

5

Introduction and supported models

6

Supported models

6

FortiGate 6000 and 7000 support

6

Special notices

7

FortiManager support for updated FortiOS private data encryption key

7

Hyperscale incompatibilities and limitations

8

FortiGate 6000 and 7000 incompatibilities and limitations

8

SSL VPN removed from 2GB RAM models for tunnel and web mode

9

2 GB RAM FortiGate models no longer support FortiOS proxy-related features

9

FortiGate VM memory and upgrade

9

Hyperscale NP7 hardware limitation

9

FortiGate cannot restore configuration file after private-data-encryption is re-enabled 10

SSL VPN not supported on FortiGate 90G series models

10

RADIUS vulnerability

11

Upgrade information

12

Fortinet Security Fabric upgrade

12

Downgrading to previous firmware versions

14

Firmware image checksums

14

FortiGate 6000 and 7000 upgrade information

14

Default setting of cp-accel-mode is changed to none on 2GB memory models

15

Policies that use an interface show missing or empty values after an upgrade

16

Managed FortiSwitch do not permit empty passwords for administrator accounts

16

SLBC FG-5001E primary blade fails to install image

16

Product integration and support

17

Virtualization environments

18

Language support

18

SSL VPN support

19

SSL VPN web mode

19

FortiExtender modem firmware compatibility

19

Resolved issues

22

GUI

22

HA

22

Intrusion Prevention

22

IPsec VPN

22

SSL VPN

23

System

23

User & Authentication

23

VM

23

Known issues

24

New known issues

24

FortiOS 7.6.2 Release Notes

3

Fortinet Inc.

FortiGate 6000 and 7000 platforms

24

Hyperscale

24

Existing known issues

25

Endpoint Control

25

Firewall

25

FortiGate 6000 and 7000 platforms

25

FortiView

26

GUI

26

HA

26

Hyperscale

27

Intrusion Prevention

27

IPsec VPN

27

Log & Report

27

Proxy

28

REST API

28

Security Fabric

28

Switch Controller

28

System

29

Upgrade

29

User & Authentication

30

Web Filter

30

WiFi Controller

30

Built-in AV Engine

31

Built-in IPS Engine

32

Limitations

33

Citrix XenServer limitations

33

Open source XenServer limitations

33

FortiOS 7.6.2 Release Notes

4

Fortinet Inc.

Change Log

Date 2025-01-28 2025-01-30
2025-02-04

Change Description
Initial release.
Updated Policies that use an interface show missing or empty values after an upgrade on page 16 and Managed FortiSwitch do not permit empty passwords for administrator accounts on page 16.
Updated Resolved issues on page 22 and Known issues on page 24.

FortiOS 7.6.2 Release Notes

5

Fortinet Inc.

Introduction and supported models

This guide provides release information for FortiOS 7.6.2 build 3462. For FortiOS documentation, see the Fortinet Document Library.

Supported models

FortiOS 7.6.2 supports the following models.

FortiGate
FortiWiFi FortiGate Rugged FortiFirewall FortiGate VM

FG-40F, FG-40F-3G4G, FG-60F, FG-61F, FG-70F, FG-71F, FG-80F, FG-80F-BP, FG-80FDSL, FG-80F-POE, FG-81F, FG-81F-POE, FG-90G, FG-91G, FG-100F, FG-101F, FG-120G, FG-121G, FG-200E, FG-200F, FG-201E, FG-201F, FG-300E, FG-301E, FG-400E, FG-400EBP, FG-401E, FG-400F, FG-401F, FG-500E, FG-501E, FG-600E, FG-601E, FG-600F, FG601F, FG-800D, FG-900D, FG-900G, FG-901G, FG-1000D, FG-1000F, FG-1001F, FG1100E, FG-1101E, FG-1800F, FG-1801F, FG-2000E, FG-2200E, FG-2201E, FG-2500E, FG2600F, FG-2601F, FG-3000D, FG-3000F, FG-3001F, FG-3100D, FG-3200D, FG-3200F, FG3201F, FG-3300E, FG-3301E, FG-3400E, FG-3401E, FG-3500F, FG-3501F, FG-3600E, FG3601E, FG-3700D, FG-3700F, FG-3701F, FG-3960E, FG-3980E, FG-4200F, FG-4201F, FG4400F, FG-4401F, FG-4800F, FG-4801F, FG-5001E, FG-5001E1, FG-6000F, FG-7000E, FG-7000F
FWF-40F, FWF-40F-3G4G, FWF-60F, FWF-61F, FWF-80F-2R, FWF-80F-2R-3G4G-DSL, FWF-81F-2R, FWF-81F-2R-3G4G-DSL, FWF-81F-2R-POE, FWF-81F-2R-3G4G-POE
FGR-60F, FGR-60F-3G4G, FGR-70F, FGR-70F-3G4G
FFW-1801F, FFW-2600F, FFW-3001F, FFW-3501F, FFW-3980E, FFW-4200F, FFW-4400F, FFW-4401F, FFW-4801F, FFW-VM64, FFW-VM64-KVM
FG-ARM64-AWS, FG-ARM64-AZURE, FG-ARM64-GCP, FG-ARM64-KVM, FG-ARM64OCI, FG-VM64, FG-VM64-ALI, FG-VM64-AWS, FG-VM64-AZURE, FG-VM64-GCP, FGVM64-HV, FG-VM64-IBM, FG-VM64-KVM, FG-VM64-OPC, FG-VM64-RAXONDEMAND, FG-VM64-XEN

FortiGate 6000 and 7000 support

FortiOS 7.6.2 supports the following FG-6000F, FG-7000E, and FG-7000F models:

FG-6000F FG-7000E FG-7000F

FG-6001F, FG-6300F, FG-6301F, FG-6500F, FG-6501F FG-7030E, FG-7040E, FG-7060E FG-7081F, FG-7121F

FortiOS 7.6.2 Release Notes

6

Fortinet Inc.

Special notices
l FortiManager support for updated FortiOS private data encryption key on page 7 l FortiGate cannot restore configuration file after private-data-encryption is re-enabled on page 10 l Hyperscale incompatibilities and limitations on page 8 l FortiGate 6000 and 7000 incompatibilities and limitations on page 8 l SSL VPN removed from 2GB RAM models for tunnel and web mode on page 9 l 2 GB RAM FortiGate models no longer support FortiOS proxy-related features on page 9 l FortiGate VM memory and upgrade on page 9 l Hyperscale NP7 hardware limitation on page 9 l SSL VPN not supported on FortiGate 90G series models on page 10 l RADIUS vulnerability on page 11
FortiManager support for updated FortiOS private data encryption key
With the introduction of FortiOS 7.6.1, Fortinet has updated the private-data-encryption key feature. Administrators are no longer required to manually input a 32-digit hexadecimal private-data-encryption key. Instead administrators simply enable the command, and a random private-data-encryption key is generated.
Previous FortiOS CLI behavior
config system global set private-data-encryption enable
end Please type your private data encryption key (32 hexadecimal numbers): 12345678901234567890123456789abc Please re-enter your private data encryption key (32 hexadecimal numbers) again: 12345678901234567890123456789abc Your private data encryption key is accepted.
New FortiOS CLI behavior
config system global set private-data-encryption enable
end This operation will generate a random private data encryption key! Previous config files encrypted with the system default key cannot be restored after this operation! Do you want to continue? (y/n)y Private data encryption key generation succeeded!

FortiOS 7.6.2 Release Notes

7

Fortinet Inc.

Special notices
FortiManager behavior
Support for the FortiGate private-data-encryption key by the Device Manager in FortiManager 7.6.2 and earlier is unchanged. It automatically detects the remote FortiGate private-data-encryption key status and prompts the administrator to manually type the private key (see picture below). FortiManager 7.6.2 and earlier does not support the updated, random private-data-encryption key as the administrator will have no knowledge of the key generated in the FortiOS CLI command above. It will be supported in a later version of FortiManager.

FortiOS upgrade behavior If in FortiOS 7.4.5 or 7.6.0 the 32-digit hexadecimal private key is enabled, and then the FortiGate device is upgraded to 7.6.1, the 32-digit hexadecimal private-data-encryption key is preserved. As a result, FortiManager 7.6.2 and earlier is aware of the 32-digit hexadecimal private-data-encryption key and can continue to manage the FortiGate device. However, if the private-data-encryption key is enabled after an upgrade of FortiOS to 7.6.1, FortiManager 7.6.2 and earlier no longer can manage FortiGate devices running FortiOS 7.6.1.
Hyperscale incompatibilities and limitations
See Hyperscale firewall incompatibilities and limitations in the Hyperscale Firewall Guide for a list of limitations and incompatibilities with FortiOS 7.6.2 features.
FortiGate 6000 and 7000 incompatibilities and limitations
See the following links for information about FortiGate 6000 and 7000 limitations and incompatibilities with FortiOS 7.6.2 features.
l FortiGate 6000 incompatibilities and limitations l FortiGate 7000E incompatibilities and limitations l FortiGate 7000F incompatibilities and limitations

FortiOS 7.6.2 Release Notes

8

Fortinet Inc.

Special notices
SSL VPN removed from 2GB RAM models for tunnel and web mode
On FortiGate models with 2GB of RAM or below, the SSL VPN web and tunnel mode feature will no longer be available from the GUI or CLI. Settings will not be upgraded from previous versions. The affected models include:
l FGT-40F/FWF-40F and variants l FGT-60F/FWF-60F l FGT-61F/FWF-61F l FGR-60F and variants (2GB versions only) To confirm if your FortiGate model has 2 GB RAM, enter diagnose hardware sysinfo conserve in the CLI and check that the total RAM value is below 2000 MB (1000 MB = 1 GB). On these FortiGate models, consider migrating to using IPsec Dialup VPN for remote access. See SSL VPN to IPsec VPN Migration for more information.
FortiGate models not listed above will continue to have SSL VPN web and tunnel mode support.

2 GB RAM FortiGate models no longer support FortiOS proxyrelated features
As part of improvements to enhance performance and optimize memory usage on FortiGate models with 2 GB RAM or less, starting from version 7.4.4, FortiOS no longer supports proxy-related features. This change impacts the FortiGate 40F and 60F series devices, along with their variants. See Proxy-related features no longer supported on FortiGate 2 GB RAM models for more information.
FortiGate VM memory and upgrade
FortiGate virtual machines (VMs) are not constrained by memory size and will continue to support all available features after upgrading to FortiOS 7.6.0. However, it is recommended to setup VMs with at least 4 GB of RAM for optimal performance.
Hyperscale NP7 hardware limitation
Because of an NP7 hardware limitation, for CGN traffic accepted by a hyperscale firewall policy that includes an overload with port block allocation (overload PBA) IP Pool, only one block is allocated per client. The setting of the

FortiOS 7.6.2 Release Notes

9

Fortinet Inc.

Special notices
hyperscale firewall policy cgn-resource-quota option is ignored. Because of this limitation, under certain rare conditions (for example, only a single server side IP address and port are being used for a large number of sessions), port allocation may fail even if the block usage of the client is less than its quota. In cases such as this, if the client has traffic towards some other servers or ports, additional port allocation can become successful. You can also work around this problem by increasing the IP Pool block size (cgn-block-size).
FortiGate cannot restore configuration file after private-dataencryption is re-enabled
In a new enhancement, enabling private-data-encryption will utilize a randomly generated private key. Therefore, FortiGate cannot restore the configuration file in the following sequence: 1. private-data-encryption enabled with random key, and configuration is backed up. 2. private-data-encryption disabled. 3. private-data-encryption enabled again, with new random key. 4. Restore configuration file in step 1. When disabling private-data-encryption, a warning in the CLI will be displayed: This operation will restore system default data encryption key! Previous config files encrypted with the private key cannot be restored after this operation! Do you want to continue? (y/n)y
SSL VPN not supported on FortiGate 90G series models
The SSL VPN web and tunnel mode feature will not be available from the GUI or the CLI on the FortiGate 90G and 91G models. Settings will not be upgraded from previous versions.

FortiOS 7.6.2 Release Notes

10

Fortinet Inc.

RADIUS vulnerability
RADIUS vulnerability
Fortinet has resolved a RADIUS vulnerability described in CVE-2024-3596. As a result, firewall authentication, FortiGate administrative GUI authentication, and WiFi authentication may be affected depending on the functionality of the RADIUS server software used in your environment. RFC 3579 contains information on the affected RADIUS attribute, message-authenticator. In order to protect against the RADIUS vulnerability described in CVE-2024-3596, as a RADIUS client, FortiGate will: 1. Force the validation of message-authenticator. 2. Reject RADIUS responses with unrecognized proxy-state attribute. Message-authenticator checking is made mandatory under UDP/TCP. It is not mandatory when using TLS. Therefore, if FortiGate is using UDP/TCP mode without RADSEC, the RADIUS server should be patched to ensure the messageauthenticator attribute is used in its RADIUS messages.
Affected Product Integration
l FortiAuthenticator version 6.6.1 and older l Third party RADIUS server that does not support sending the message-authenticator attribute
Solution
l Upgrade FortiAuthenticator to version 6.6.2, 6.5.6 or 6.4.10 and follow the upgrade instructions: https://docs.fortinet.com/document/fortiauthenticator/6.6.2/release-notes/859240/upgrade-instructions
l Upgrade the RADIUS server and/or enable it to send the correct message-authenticator attribute

FortiOS 7.6.2 Release Notes

11

Fortinet Inc.

Upgrade information

Supported upgrade path information is available on the Fortinet Customer Service & Support site.

FortiGate Individual FortiGate devices
Multiple FortiGate devices in a Fortinet Security Fabric

Upgrade option

Details

Manual update

Use the procedure in this topic.
See also Upgrading individual devices in the FortiOS Administration Guide.

Automatic update based on FortiGuard upgrade path

See Enabling automatic firmware updates in the FortiOS Administration Guide for details

Manual, immediate or scheduled

See Fortinet Security Fabric upgrade

update based on FortiGuard upgrade on page 12 and Upgrading all devices

path

in the FortiOS Administration Guide.

To view supported upgrade path information:
1. Go to https://support.fortinet.com. 2. From the Download menu, select Firmware Images. 3. Check that Select Product is FortiGate. 4. Click the Upgrade Path tab and select the following:
l Current Product l Current FortiOS Version l Upgrade To FortiOS Version 5. Click Go.

Fortinet Security Fabric upgrade

FortiOS 7.6.2 is verified to work with these Fortinet products. This includes:

FortiAnalyzer FortiManager FortiExtender FortiSwitch OS (FortiLink support) FortiAP

l 7.6.2 l 7.6.2 l 7.4.0 and later l 6.4.6 build 0470 and later
l 7.2.2 and later

FortiOS 7.6.2 Release Notes

12

Fortinet Inc.

Upgrade information

FortiAP-U FortiAP-W2 FortiClient EMS FortiClient Microsoft Windows FortiClient Mac OS X FortiClient Linux FortiClient iOS FortiClient Android FortiSandbox

l 6.2.5 and later l 7.2.2 and later l 7.0.3 build 0229 and later l 7.0.3 build 0193 and later l 7.0.3 build 0131 and later l 7.0.3 build 0137 and later l 7.0.2 build 0036 and later l 7.0.2 build 0031 and later l 2.3.3 and later for post-transfer scanning l 4.2.0 and later for post-transfer and inline scanning

* If you are using FortiClient only for IPsec VPN or SSL VPN, FortiClient version 6.0 and later are supported. When upgrading your Security Fabric, devices that manage other devices should be upgraded first.

When using FortiClient with FortiAnalyzer, you should upgrade both to their latest versions. The versions between the two products should match. For example, if using FortiAnalyzer 7.6.0, use FortiClient 7.6.0.

Upgrade the firmware of each device in the following order. This maintains network connectivity without the need to use manual steps.
1. FortiAnalyzer 2. FortiManager 3. FortiGate devices 4. Managed FortiExtender devices 5. Managed FortiSwitch devices 6. Managed FortiAP devices 7. FortiClient EMS 8. FortiClient 9. FortiSandbox 10. FortiMail 11. FortiWeb 12. FortiNAC 13. FortiVoice 14. FortiDeceptor 15. FortiNDR 16. FortiTester 17. FortiMonitor

If Security Fabric is enabled, then all FortiGate devices must be upgraded to 7.6.2. When Security Fabric is enabled in FortiOS 7.6.2, all FortiGate devices must be running FortiOS 7.6.2.

FortiOS 7.6.2 Release Notes

13

Fortinet Inc.

Upgrade information
Downgrading to previous firmware versions
Downgrading to previous firmware versions results in configuration loss on all models. Only the following settings are retained:
l operation mode l interface IP/management IP l static route table l DNS settings l admin user account l session helpers l system access profiles
Firmware image checksums
The MD5 checksums for all Fortinet software and firmware releases are available at the Customer Service & Support portal, https://support.fortinet.com. After logging in, go to Support > Firmware Image Checksums (in the Downloads section), enter the image file name including the extension, and click Get Checksum Code.
FortiGate 6000 and 7000 upgrade information
Upgrade FortiGate 6000 firmware from the management board GUI or CLI. Upgrade FortiGate 7000 firmware from the primary FIM GUI or CLI. The FortiGate 6000 management board and FPCs or the FortiGate 7000 FIMs and FPMs all run the same firmware image. Upgrading the firmware copies the firmware image to all components, which then install the new firmware and restart. A FortiGate 6000 or 7000 firmware upgrade can take a few minutes, the amount of time depending on the hardware and software configuration and whether DP or NP7 processor software is also upgraded. On a standalone FortiGate 6000 or 7000, or an HA cluster with uninterruptible-upgrade disabled, the firmware upgrade interrupts traffic because all components upgrade in one step. These firmware upgrades should be done during a quiet time because traffic can be interrupted for a few minutes during the upgrade process. Fortinet recommends running a graceful firmware upgrade of a FortiGate 6000 or 7000 FGCP HA cluster by enabling uninterruptible-upgrade and session-pickup. A graceful firmware upgrade only causes minimal traffic interruption.
Fortinet recommends that you review the services provided by your FortiGate 6000 or 7000 before a firmware upgrade and then again after the upgrade to make sure that these services continue to operate normally. For example, you might want to verify that you can successfully access an important server used by your organization before the upgrade and make sure that you can still reach the server after the upgrade and performance is comparable. You can also take a snapshot of key performance indicators (for example, number of sessions, CPU usage, and memory usage) before the upgrade and verify that you see comparable performance after the upgrade.

FortiOS 7.6.2 Release Notes

14

Fortinet Inc.

Upgrade information
To perform a graceful upgrade of your FortiGate 6000 or 7000 to FortiOS 7.6.2:
1. Use the following command to set the upgrade-mode to uninterruptible to support HA graceful upgrade: config system ha set uninterruptible-upgrade enable end
When upgrading from FortiOS 7.4.1 to a later version, use the following command to enable uninterruptible upgrade: config system ha
set upgrade-mode uninterruptible end
2. Download the FortiOS 7.6.2 FG-6000F, FG-7000E, or FG-7000F firmware from https://support.fortinet.com. 3. Perform a normal upgrade of your HA cluster using the downloaded firmware image file. 4. When the upgrade is complete, verify that you have installed the correct firmware version.
For example, check the FortiGate dashboard or use the get system status command. 5. Check the Cluster Status dashboard widget or use the diagnose sys confsync status command to confirm
that all components are synchronized and operating normally.
Default setting of cp-accel-mode is changed to none on 2GB memory models
This change disables CP acceleration to lower system memory usage thus can prevent some unexpected behavior due to lack of memory. Previous FortiOS CLI behavior: config ips global
set cp-accel-mode advanced end New FortiOS CLI behavior after upgrade: config ips global
set cp-accel-mode none end This change will cause performance impact as CPU will do the pre-match (pattern match) inside IPS (CPU) instead of hardware engine (cp module in SOC4). Some customers could expect an increase in CPU utilization as a result. FortiGate and FortiWiFi 4xF/6xF families are affected by this change.

FortiOS 7.6.2 Release Notes

15

Fortinet Inc.

Upgrade information
Policies that use an interface show missing or empty values after an upgrade
If local-in policy, DoS policy, interface policy, multicast policy, TTL policy, or central SNAT map used an interface in version 7.4.5, 7.6.0 GA or any previous GA version that was part of the SD-WAN zone, these policies will be deleted or show empty values after upgrading to version 7.4.6 or 7.6.1 or later. After upgrading to version 7.4.6 or 7.6.1 GA or later, users must manually recreate these policies and assign them to the appropriate SD-WAN zone.
Managed FortiSwitch do not permit empty passwords for administrator accounts
Starting from FortiOS version 7.6.1, a managed FortiSwitch no longer permits empty passwords for the admin account. If a FortiSwitch unit was previously authorized without an admin password, the FortiGate will automatically generate a random admin password for the FortiSwitch upon upgrading to 7.6.1 or later. This change will cause the admin to lose access. To regain access, configure a password override on the FortiGate device using the following commands: config switch-controller switch-profile
edit default set login-passwd-override enable set login-passwd <passwd>
next end
FortiSwitch units with an existing admin password will not be affected by this change.
SLBC FG-5001E primary blade fails to install image
For FG-5001E in a session-aware load balanced cluster (SLBC), all secondary blades install the image successfully. However, the primary blade fails, showing a sync timeout error, even with graceful-upgrade disabled.

FortiOS 7.6.2 Release Notes

16

Fortinet Inc.

Product integration and support

The following table lists FortiOS 7.6.2 product integration and support information:

Web browsers Explicit web proxy browser FortiController Fortinet Single Sign-On (FSSO)
AV Engine IPS Engine

l Microsoft Edge 112 l Mozilla Firefox version 113 l Google Chrome version 113 Other browser versions have not been tested, but may fully function. Other web browsers may function correctly, but are not supported by Fortinet.
l Microsoft Edge 112 l Mozilla Firefox version 113 l Google Chrome version 113 Other browser versions have not been tested, but may fully function. Other web browsers may function correctly, but are not supported by Fortinet.
l 5.2.5 and later Supported models: FCTL-5103B, FCTL-5903C, FCTL-5913C
l 5.0 build 0319 and later (needed for FSSO agent support OU in group filters) l Windows Server 2022 Standard l Windows Server 2022 Datacenter l Windows Server 2019 Standard l Windows Server 2019 Datacenter l Windows Server 2019 Core l Windows Server 2016 Datacenter l Windows Server 2016 Standard l Windows Server 2016 Core l Windows Server 2012 Standard l Windows Server 2012 R2 Standard l Windows Server 2012 Core l Novell eDirectory 8.8
l 7.00034
l 7.01026

See also:
l Virtualization environments on page 18 l Language support on page 18 l SSL VPN support on page 19 l FortiExtender modem firmware compatibility on page 19

FortiOS 7.6.2 Release Notes

17

Fortinet Inc.

Product integration and support
Virtualization environments

The following table lists hypervisors and recommended versions.

Hypervisor Citrix Hypervisor Linux KVM
Microsoft Windows Server Windows Hyper-V Server Open source XenServer
VMware ESXi

Recommended versions l 8.2 Express Edition, CU1 l Ubuntu 22.04.3 LTS l Red Hat Enterprise Linux release 9.4 l SUSE Linux Enterprise Server 12 SP3 release 12.3 l Windows Server 2022 l Microsoft Hyper-V Server 2022 l Version 3.4.3 l Version 4.1 and later l Versions 6.5, 6.7, 7.0, and 8.0.

Language support

The following table lists language support information.

Language support

Language

GUI

English



Chinese (Simplified)



Chinese (Traditional)



French



Japanese



Korean



Portuguese (Brazil)



Spanish



FortiOS 7.6.2 Release Notes

18

Fortinet Inc.

Product integration and support
SSL VPN support

SSL VPN web mode

The following table lists the operating systems and web browsers supported by SSL VPN web mode.

Supported operating systems and web browsers

Operating System Microsoft Windows 7 SP1 (32-bit & 64-bit) Microsoft Windows 10 (64-bit)
Ubuntu 20.04 (64-bit) macOS Ventura 13.1
iOS
Android

Web Browser
Mozilla Firefox version 113 Google Chrome version 112
Microsoft Edge Mozilla Firefox version 113 Google Chrome version 112
Mozilla Firefox version 113 Google Chrome version 112
Apple Safari version 16 Mozilla Firefox version 103 Google Chrome version 111
Apple Safari Mozilla Firefox Google Chrome
Mozilla Firefox Google Chrome

Other operating systems and web browsers may function correctly, but are not supported by Fortinet.

FortiExtender modem firmware compatibility

The following table lists the modem firmware file name and version for each FortiExtender model and its compatible geographical region.

FortiExtender model FEX-101F-AM
FEX-101F-EA

Modem firmware image name
FEM_EM06A-22-1-1 FEM_EM06E-22-01-01 FEM_EM06E-22.2.2

Modem firmware file on Support site
FEM_EM06A-22.1.1-build0001.out FEM_EM06E-22.1.1-build0001.out FEM_EM06E-22.2.2-build0002.out

Geographical region
America EU EU

FortiOS 7.6.2 Release Notes

19

Fortinet Inc.

Product integration and support

FortiExtender model FEX-201E
FEX-201F-AM

Modem firmware image name FEM_06-19-0-0-AMEU FEM_06-19-1-0-AMEU FEM_06-22-1-1-AMEU FEM_06-22-1-2-AMEU
FEM_07A-22-1-0-AMERICA
FEM_07A-22-2-0-AMERICA

FEX-201F-EA

FEM_07E-22-0-0-WRLD FEM_07E-22-1-1-WRLD

FEX-202F-AM

FEM_07A-22-1-0-AMERICA FEM_07A-22-2-0-AMERICA

FEX-202F-EA
FEX-211E
FEV-211F_AM FEV-211F FEX-211F-AM FEX-212F FEX-311F

FEM_07E-22-1-1-WRLD
FEM_12-19-1-0-WRLD FEM_12-19-2-0-WRLD FEM_12-22-1-0-AMEU FEM_12-22-1-1-WRLD FEM_12_EM7511-22-1-2AMERICA FEM_12-22-1-0-AMEU FEM_12_EM7511-22-1-2AMERICA FEM_12-19-2-0-WRLD FEM_12-22-1-1-WRLD FEM_EM160-22-02-03 FEM_EM160-22-1-2

Modem firmware file on Support Geographical

site

region

FEM_06-19.0.0-build0000-AMEU.out America and EU

FEM_06-19.1.0-build0001-AMEU.out America and EU

FEM_06-22.1.1-build0001-AMEU.out America and EU

FEM_06-22.1.2-build0001-AMEU.out America and EU

FEM_07A-22.1.0-build0001AMERICA.out

America

FEM_07A-22.2.0-build0002AMERICA.out

America

FEM_07E-22.0.0-build0001WRLD.out

World

FEM_07E-22.1.1-build0001WRLD.out

World

FEM_07A-22.1.0-build0001AMERICA.out

America

FEM_07A-22.2.0-build0002AMERICA.out

America

FEM_07E-22.1.1-build0001WRLD.out

World

FEM_12-19.1.0-build0001-WRLD.out World

FEM_12-19.2.0-build0002-WRLD.out World

FEM_12-22.0.0-build0001-AMEU.out America and EU

FEM_12-22.1.1-build0001-WRLD.out World

FEM_12_EM7511-22.1.2-build0001- America AMERICA.out

FEM_12-22.1.0-build0001-AMEU.out World

FEM_12_EM7511-22.1.2-build0001- America AMERICA.out

FEM_12-19.2.0-build0002-WRLD.out World

FEM_12-22.1.1-build0001-WRLD.out World

FEM_EM160-22.2.3-build0001.out World

FEM_EM160-22.1.2-build0001.out World

FortiOS 7.6.2 Release Notes

20

Fortinet Inc.

Product integration and support

FortiExtender model
FEX-511F

Modem firmware image name FEM_RM502Q-21-2-2 FEM_RM502Q-22-03-03
FEM_RM502Q-22-04-04-AU
FEM_RM502Q-22-1-1 FEM_RM502Q-22-2-2

Modem firmware file on Support site
FEM_RM502Q-21.2.2-build0003.out FEM_RM502Q-22.3.3-build0004.out FEM_RM502Q-22.4.4-build0005_ AU.out FEM_RM502Q-22.1.1-build0001.out FEM_RM502Q-22.2.2-build0002.out

Geographical region World World
Australia
World World

The modem firmware can also be uploaded manually by downloading the file from the Fortinet Customer Service & Support site. The firmware file names are listed in the third column of the table.

To download the modem firmware:
1. Go to https://support.fortinet.com/Download/FirmwareImages.aspx. 2. From the Select Product dropdown, select FortiExtender. 3. Select the Download tab. 4. Click MODEM-Firmware. 5. Select the FortiExtender model and image name, then download the firmware file.

FortiOS 7.6.2 Release Notes

21

Fortinet Inc.

Resolved issues

The following issues have been fixed in version 7.6.2. To inquire about a particular bug, please contact Customer Service & Support.

GUI

Bug ID 1092489
1110382

Description
The config system fortiguard > fortiguard-anycast setting was changed to automatically disable when the FortiGuard page is shown on GUI. Admin can log in to GUI (HTTPS) with password, even when admin-https-pki-required is enabled.

HA
Bug ID 1108895

Description
In an FGSP cluster, enabling and disabling standalone-config-sync results in the local dev_ base being deleted and synchronized with the peer, which leads to the absence of the dev_base.

Intrusion Prevention

Bug ID 1107445

Description Remove IPS diagnose command diagnose ips cfgscript run.

IPsec VPN

Bug ID 1103594 1012615 1073670

Description ADVPN IPsec traffic over shortcut drops when IPsec tunnel rekeys. IPsec VPN traffic is dropped after upgrading to version 7.4.3. An IkEd crash on secondary causes IPsec client to reconnect.

FortiOS 7.6.2 Release Notes

22

Fortinet Inc.

Resolved issues
SSL VPN

Bug ID 1077157
1101837

Description
FortiGate sends out expired server certificate for a given SSL VPN realm, even when the certificate configured in virtual-host-server-cert has been updated. Insufficient session expiration in SSL VPN using SAML authentication.

System
Bug ID 1102416

Description Cannot push config sfp-dsl enable and vectoring under interface.

User & Authentication

Bug ID 1075207

Description fnbam may crash due to configuration of two wildcard-enabled remote admins in separate VDOMs.

VM
Bug ID 1012000

Description When unicast HA setup has a large number of interfaces, FGT Hyper-V takes a long time to boot up.

FortiOS 7.6.2 Release Notes

23

Fortinet Inc.

Known issues

Known issues are organized into the following categories: l New known issues on page 24 l Existing known issues on page 25
To inquire about a particular bug or report a bug, please contact Customer Service & Support.

New known issues

The following issues have been identified in version 7.6.2.

FortiGate 6000 and 7000 platforms

Bug ID 1102072 1112581
1112582
1116862 1118004

Description
On the FortiGate 7000 platform, cmdbsvr CPU usage can be higher than normal for extended periods on one or more FPM.
On the FortiGate 7000F platform, after upgrading from FortiOS 7.4.7 to 7.6.2, cmdbsvr CPU usage can be at 99% on one or more FPMs for several minutes. During high CPU usage, FortiGuard packets cannot be synchronized to the affected FPM(s).
Under some conditions, such as during conserve mode, you may be unable to log in to the FortiGate 6000 management board GUI or CLI, or when you log in to the management board console, a message similar to fork failed() continuously repeats.
Graceful upgrade of a FortiGate 7000E chassis to FortiOS 7.6.2 may fail for some configurations.
On a FortiGate 7000E FGCP cluster, after using the execute ha disconnect command to disconnect a chassis from the cluster, you can't use the special management ports to connect to the FIM in slot 2 or to any of the FPMs of either chassis. You can still connect to the FIM in slot 1.

Hyperscale
Bug ID 1108263

Description
HA configurations are lost if hw-sess-sync-dev is configured with more interfaces than expected. (The expectation is two times the number of NP7 chips.)

FortiOS 7.6.2 Release Notes

24

Fortinet Inc.

Known issues
Existing known issues

The following issues have been identified in a previous version of FortiOS and remain in FortiOS 7.6.2.

Endpoint Control

Bug ID 1019658 1038004

Description On FortiGate, not all registered endpoint EMS tags are displayed in the GUI. FortiGate may not display the correct user information for some FortiClient instances.

Firewall
Bug ID 959065 990528 994986
1117165

Description
On the Policy & Objects > Traffic Shaping page, when deleting or creating a shaper, the counters for the other shapers are cleared.
When searching for an IP address on the Firewall Policy page, the search/filter functionality does not return the expected results.
The By Sequence view in the Firewall policy list may incorrectly show a duplicate implicit deny policy in the middle of the list. This is purely a GUI display issue and does not impact policy operation. The Interface Pair View and Sequence Grouping View do not have this issue.
Leaving the apn field empty in a GTP APN traffic shaping policy means that the policy will not match any traffic. Consequently, APN traffic shaping can only be applied to specific APNs. To configure GTP APN traffic shaping:
config gtp apn-shaper edit <policy-id> set apn [<apn-name> <apngrp-name> ...] set rate-limit <limit> set action {drop | reject} set back-off-time <time> next
end

FortiGate 6000 and 7000 platforms

Bug ID 653335

Description SSL VPN user status does not display on the FortiManager GUI.

FortiOS 7.6.2 Release Notes

25

Fortinet Inc.

Known issues
Bug ID 790464 936320 950983 994241 998615 1006759 1014826
FortiView
Bug ID 1034148
GUI
Bug ID 853352 1047146 1047963
HA
Bug ID 851743

Description After a failover, ARP entries are removed from all slots when an ARP query of single slot does not respond. When there is a heavy traffic load, there are no results displayed on any FortiView pages in the GUI. Feature Visibility options are visible in the GUI on a mgmt-vdom. On FortiGate 7000F using FGSP and FGCP, when TCP traffic takes an asymmetric path, the TCP ACK and data packets might be dropped in NP7. When doing a GUI-packet capture on FortiGate, the through-traffic packets are not captured. After an HA failover, there is no IPsec route in the kernel. SLBC does not function as expected with IPsec over TCP enabled.
Description The Application Bandwidth widget on the Dashboard > Status page does not display some external applications bandwidth data.
Description When viewing entries in slide-out window of the Policy & Objects > Internet Service Database page, users cannot scroll down to the end if there are over 100000 entries. After a firmware upgrade, a VLAN interface used in IPsec, SSL VPN, or SD-WAN is not displayed on the interface list or the SD-WAN page and cannot be configured in the GUI. High Node.js memory usage when building FortiManager in Report Runner fails. Occurs when FortiManager has a slow connection, is unreachable from the FortiGate (because FMG is behind NAT), or the IP is incorrect.
Description When running the diag sys ha checksum cluster command, a previous line result is added further down in the output instead of new line result when a FortiGate is configured with several VDOMs .

FortiOS 7.6.2 Release Notes

26

Fortinet Inc.

Known issues
Hyperscale
Bug ID 1013892 1030907 1042011 1093287

Description
On FortiGate's in an HA pair, the npd process do not work as expected when trying to manually update the threat feed.
With a FGSP and FGCP setup, sessions do not show on the HA secondary when the FGSP peer is in HA.
On FortiGate, an login error message displays in the event log after completing an automation.
Using fixed-allocation IP Pools may cause NP7 NSS/PRP modules to become stuck, potentially disrupting traffic. Other PBA IP pools do not have this issue.

Intrusion Prevention

Bug ID 1076213

Description
FortiGate's with 4GB memory might enter conserve mode during the FortiGuard update when IPS or APP control is enabled. Workaround: Disable the proxy-inline-ips option under config ips settings.

IPsec VPN
Bug ID 735398
995912
1012615 1042371 1103754

Description
On FortiGate, the IKE anti-replay does not log duplicate ESP packets when SA is offloaded in the event log. After a firmware upgrade, some VPN tunnels experience intermittent signal disruptions causing traffic to be re-routed. IPsec VPN traffic is dropped after upgrading to version 7.4.3. RADIUS authentication with EAP-TLS does not work as expected through IPsec tunnels. Traffic is not forwarded with Ntrubo enabled and an IPsec VPN tunnel to FortiGate.

Log & Report

Bug ID 611460

Description
On FortiOS, the Log & Report > Forward Traffic page does not completely load the entire log when the log exceeds 200MB.

FortiOS 7.6.2 Release Notes

27

Fortinet Inc.

Known issues
Proxy
Bug ID 1023054 1035490

Description
After an upgrade on a 2GB FortiGate device, the firewall policy does not switch from Proxy-based to Flow-based in the Inspection mode field.
The firewall policy works with proxy-based inspection mode on FortiGate models with 2GB RAM after an upgrade. Workaround: After an upgrade, reboot the FortiGate.

REST API
Bug ID 938349 993345 1051870

Description
Unsuccessful API user login attempts do not get reset within the time specified in adminlockout-threshold.
The router API does not include all ECMP routes for SD-WAN included in the get router info routing-table command.
After a firmware upgrade, some vlan interfaces attached to LAG interface are not displayed in the GUI.

Security Fabric

Bug ID 903922 1011833 1019844 1040058

Description
Physical and logical topology is slow to load when there are a lot of managed FortiAP devices (over 50). This issue does not impact FortiAP management and operation.
FortiGate experiences a CPU usage issue in the Node.js daemon when there multiple administrator sessions running simultaneously.
In an HA configuration, when the primary FortiGate unit fails over to a downstream unit, the previous primary unit displays as being permanently disconnected.
The Security Rating topology and results does not display non-FortiGate devices.

Switch Controller

Bug ID 961142
1113304

Description
An interface in FortiLink is flapping with an MCLAG FortiSwitch using DAC on an OPSFPP-T-05PAB transceiver.
FortiSwitch are offline after FortiGate is upgraded from 7.6.0 to 7.6.1 or later when LLDP configuration set to vdom/disable under the FortiLink interface.

FortiOS 7.6.2 Release Notes

28

Fortinet Inc.

Known issues Bug ID
System
Bug ID 947982 971466 1041726 1046484 1047085 1058256 1069208 1103146 1103617 1112376
Upgrade
Bug ID 1043815
1104649
1106072

Description Workaround: In LLDP configuration, enable lldp-reception and lldp-transmission under the FortiLink interface, or rebuild the FortiLink interface.
Description On NP7 platforms, DSW packets are missing resulting in VOIP experiencing performance issues during peak times. FortiGateRugged 60 models may experience packet loss when directly connected to Cisco switch. Traffic flow speed is reduced or interrupted when the traffic shaper is enabled. After shutting down FortiGate, the system automatically boots up again. The FortiOS GUI is unresponsive due to a CPU usage issue with the csfd and node processes. On FortiGate, interfaces with DAC cables remain down after upgrading to version 7.4.4. If the DHCP offer contains padding when DHCP relay is used, the DHCP relay deletes the padding before relaying the packet. Packet capture duplicate entries on FortiGate. Integrating an interface does not work when adding a new member into an existing interface or creating a new interface. On FortiGate 7000E, application newcli crashes at create_tree at ././cmf/cli/node.c:906.
Description Upgrading the firmware for a large number (100+) of FortiSwitch or FortiAP devices at the same time may cause performance issues with the GUI and some devices may not upgrade. Workaround: pace out the upgrade schedule and upgrade devices in smaller batches. If a local-in policy, DoS policy, interface policy, multicast policy, TTL policy, or central SNAT map used an interface in version 7.4.5, 7.6.0 or any previous GA version that was part of the SD-WAN zone, these policies will be deleted or show empty values after upgrading to version 7.4.6 or 7.6.1. Workaround: After upgrading to 7.4.6 or 7.6.1 GA, users must manually recreate these policies and assign them to the appropriate SD-WAN zone. The image file transfer between FortiManager and FortiGate may not work as expected when transferred by the FGFM tunnel.

FortiOS 7.6.2 Release Notes

29

Fortinet Inc.

Known issues

User & Authentication

Bug ID 802089 1021719 1082800
1112718

Description
User groups from FortiManager are not synchronized across all units except the MBD.
On the System > Certificates page, the Create Certificate pane does not function as expected after creating a new certificate.
When performing LDAP user searches from the GUI against LDAP servers with a large number of users (more than 100000), FortiGate may experience a performance issue and not operate as expected due to the HTTPSD process consuming too much memory. User may need to stop the HTTPSD process or perform a reboot to recover. Workaround: Perform an LDAP user search using the CLI.
When RADIUS server has the require-message-authenticator setting disabled, The GUI RADIUS server dialogs Test connectivity and Test user credentials still check for the message-authenticator value and incorrectly fail the test with missing authenticator error message.
config user radius edit <radius server> set require-message-authenticator disable next
end
This is only a GUI display issue and the end-to-end integration with RADIUS server should still work. Workaround: Confirm the connection to RADIUS server with the CLI command diagnose test authserver radius <server> <method> <user> <password>

Web Filter
Bug ID 1040147 1058007

Description Options set in ftgd-wf cannot be undone for a web filter configuration. Web filter custom replacement messages in group configurations cannot be edited in FortiGate.

WiFi Controller

Bug ID 1083395

Description
In an HA environment with FortiAPs managed by primary FortiGate, the secondary FortiGate GUI Managed FortiAP page may show the FortiAP status as offline if the FortiAP traffic is not routed through the secondary FortiGate. This is only a GUI issue and does not impact FortiAP operation.

FortiOS 7.6.2 Release Notes

30

Fortinet Inc.

Built-in AV Engine
AV Engine 7.00034 is released as the built-in AV Engine. Refer to the AV Engine Release Notes for information.

FortiOS 7.6.2 Release Notes

31

Fortinet Inc.

Built-in IPS Engine
IPS Engine 7.001026 is released as the built-in IPS Engine. Refer to the IPS Engine Release Notes for information.

FortiOS 7.6.2 Release Notes

32

Fortinet Inc.

Limitations
Citrix XenServer limitations
The following limitations apply to Citrix XenServer installations: l XenTools installation is not supported. l FortiGate-VM can be imported or deployed in only the following three formats: l XVA (recommended) l VHD l OVF l The XVA format comes pre-configured with default configurations for VM name, virtual CPU, memory, and virtual NIC. Other formats will require manual configuration before the first power on process.
Open source XenServer limitations
When using Linux Ubuntu version 11.10, XenServer version 4.1.0, and libvir version 0.9.2, importing issues may arise when using the QCOW2 format and existing HDA issues.

FortiOS 7.6.2 Release Notes

33

Fortinet Inc.

www.fortinet.com
Copyright© 2025 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet's Chief Legal Officer, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be limited to performance in the same ideal conditions as in Fortinet's internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most current version of the publication shall be applicable.


madbuild