FortiProxy 7.4.3 Release Notes

FortiProxy delivers a class-leading Secure Web Gateway, security features, unmatched performance, and the best user experience for web sites and cloud-based applications.

Change log

DateChange Description
2024-02-16Initial release.
2024-02-22Added CVE-2023-28002 to Resolved issues on page 22.
2024-02-28Added ticket 1005060 to Known issues on page 28.
2024-03-12Added CVE-2024-23112 to Resolved issues on page 22.
2024-04-10Updated What's new on page 7.
2024-06-11Added CVE-2024-21754 and CVE-2024-23111 to Resolved issues on page 22.
2024-08-21Updated What's new on page 7.
2024-09-24Updated Introduction on page 5 and Deployment information on page 19.
2024-09-27Added ticket 1060812 to Known issues on page 28.
2024-10-21Added CVE-2024-23113 and CVE-2024-21754 to Resolved issues on page 22.

Introduction

FortiProxy 7.4.3 supports upgrade from the following versions only:

Refer to Deployment information on page 19 for detailed upgrade instructions.

All FortiProxy models include the following features out of the box:

Security modules

The unique FortiProxy architecture offers granular control over security, understanding user needs and enforcing Internet policy compliance with the following security modules:

Caching and WAN optimization

All traffic between a client network and one or more web servers is intercepted by a web cache policy. This policy causes the FortiProxy unit to cache pages from the web servers on the FortiProxy unit and makes the cached pages available to users on the client network. Web caching can be configured for standard and reverse web caching.

FortiProxy supports WAN optimization to improve traffic performance and efficiency as it crosses the WAN. FortiProxy WAN optimization consists of a number of techniques that you can apply to improve the efficiency of communication across your WAN. These techniques include protocol optimization, byte caching, SSL offloading, and secure tunneling.

Protocol optimization can improve the efficiency of traffic that uses the CIFS, FTP, HTTP, or MAPI protocol, as well as general TCP traffic. Byte caching caches files and other data on FortiProxy units to reduce the amount of data transmitted across the WAN.

FortiProxy is intelligent enough to understand the differing caching formats of the major video services in order to maximize cache rates for one of the biggest contributors to bandwidth usage. FortiProxy will:

What's new

The following sections describe new features, enhancements, and changes in FortiProxy 7.4.3:

IPv6 support for explicit FTP and web proxy forwarding server

FortiProxy 7.4.3 adds IPv6 support for explicit FTP and web proxy forwarding server.

Protocol detection of tunneled traffic over SOCKS server

FortiProxy 7.4.3 automatically determines the protocol of tunneled traffic over SOCKS server when the destination port does not match any protocol ports.

Reorder server URL by dragging and dropping

Under Proxy Settings > Server URL, you can now drag and drop the items to quickly reorder them as needed.

Require password to access encrypted archive files

You can now configure FortiProxy to require a password for access to encrypted archive files using the new encrypted-file-log option under config firewall profile-protocol-options. The default is disable. When enabled, an HTTP(S) replacement message is displayed to request a password to decrypt and scan the encrypted file. Files failed to decrypt will be blocked.

config firewall profile-protocol-options
 edit "decrypt"
 config http
 end
 next
 set encrypted-file inspect {This option must be set to inspect.}
 set encrypted-file-log enable
end

FortiAnalyzer or Cloud logging is now optional for license sharing

FortiProxy 7.4.3 no longer requires FortiAnalyzer or Cloud Logging to be enabled for security fabric groups for license sharing purposes only. However, you still need to enable FortiAnalyzer or Cloud Logging in order to use any security fabric functionality.

GUI support for URL category parameter for policy matching

FortiProxy now supports policy matching using the URL category parameter when you create or edit a policy in GUI.

Global external resource size limit

FortiProxy 7.4.3 changes the external resource size limit from a per feed limit to a global limit. The limits (listed below) now apply to the total size or total number of lines of all external resources of a given type.

File size limit16 MB
Line limit200K

AWS ARM64 support

You can now deploy the FortiProxy on the AWS ARM64 platform.

CLI changes

FortiProxy 7.4.3 includes the following CLI changes:

The date format is yyyy/mm/dd. The year range is 2001 - 2050.

Example output:

diagnose wad tcp-connection list all
===type=worker index=0 pid=1387===
Group by src_ip(only show top 10):
10.5.2.39 count=3160
Group by dst_ip:port(only show top 10):
74.6.160.107:443 count=904
142.251.33.67:80 count=834
Group by dst port(only show top 10):
443 count=1738
===type=worker index=1 pid=1389===
Group by src_ip(only show top 10):
10.5.2.39 count=3160
Group by dst_ip:port(only show top 10):
74.6.160.107:443 count=904
142.251.33.67:80 count=834
Group by dst port(only show top 10):
443 count=1738

WAD authentication and HTTP engine data is consolidated into shared memory. As a result, the following commands are changed:

Example output:

# dia wad stats worker.http_engine
http_lway_svr.total_req 0
http_1way_svr.served_req 0
http_1way_svr.total_server 0
http_1way_svr.active_server 0
http.total_req 0
http.total_sessions 0
webcache.total_req 0
webcache.concurrent_req 0
web_proxy.total_req 0
web_proxy.total_sessions 0
web_proxy.concurrent_req 0

web_proxy.concurrent_sessions 0

n_http_reqs 0

n_long_http_reqs 0

n_vary_reqs 0

n_connect_reqs 0

n_ftp_reqs 0

n_req_invalid_url 0

n_req_invalid_header 0

n_req_unexpect_body 0

n_req_child_uci_complex 0

n_req_child_uci_fail 0

n_req_fwd 0

n_req_rspd 0

n_req_errors 0

n_req_error_sp 0

n_req_error_hs 0

n_req_error_act 0

n_req_error_es 0

n_req_add_hdr_error 0

n_req_bad_request 0

n_req_dns_failed 0

n_req_bad_http_ver 0

n_nontp_reqs 0

n_nontp_connect_ok 0

n_connect_req_error 0

n_req_cancel 0

n_http_rsps 0

n_rsp_errors 0

n_rsp_error_info 0

n_rsp_error_1_0 0

n_rsp_error_proc 0

n_rsp_1xx 0

n_connect rsp 0

n_rsp_from_cache 0

n_rsp miss 504 0

n_rsp_neg 0

n_rsp_invalidate 0

n_rsp_add_hdr_error 0

n rsp invalid header 0

n_rsp_407_from_fwd_svr 0

n_rsp_malformed_cors_preflight 0

n_warn wait dns 0

n warn wait auth 0

n_warn_wait_videofilter 0

n warn wait urlfilter 0

n_warn_wait_msg_proc 0

n warn wait scan 0

n_warn_proc_resp 0

n_warn_wait_antiphish 0

n_icap_req_start 0

n_icap_req_end 0

n_icap_resp_start 0

n_icap_resp_end 0

n_icap_unchanged 0

n_icap_error client 0

n_icap_error_server 0

n_icap_block 0

n_icap_unblock 0

n_suspend_svr_read 0

n_resume_svr_read 0

n_cvrt_tun_by_non_http_resp_ok 0

n_cvrt_tun_by_non_http_resp_fail0

n_off_ssl_ctx 0

n_unexpected resp 0

n_rsp_cache_errors 0

n_ce_evading 0

n_ce_utm_skip 0

n_ce_utm block 0

n_ce_utm_bypass 0

n_ce_utm_inspect 0

n_conserve_drop 0

_conserve_bypass 0

n_scan_errors 0

n_comfort_unique_req 0

n_total comfort fires 0

n_ignoed_reqs_cannot conn 0

n_unexpected_h2_conn 0

n_ia_bypass 0

n_ia_scan 0

dns_protect.n_total 0

dns_protect.n_valid 0

dns_protect.n_ip 0

dns_protect.n_failure 0

dns_protect.n_now 0

dns_protect.n_max 0

# dia wad stats worker.?

worker.http_engine Show http_engine statistics.

worker.auth Show auth statistics.

worker.auth.saml Show auth saml statistics.

worker.auth.basic Show auth basic statistics.

worker.auth.cert Show auth cert statistics.

worker.auth.cookie Show auth cookie statistics.

worker.auth.digest Show auth_digest statistics.

worker.auth.fsae Show auth fsae statistics.

worker.auth.krb Show auth krb statistics.

worker.auth.mix Show auth mix statistics.

worker.auth.ntlm Show auth ntlm statistics.

worker.auth.pkey Show auth_pkey statistics.

worker.auth.rsso Show auth rsso statistics.

worker.auth.user_query Show auth_user_query statistics.

# dia wad stats worker.auth

saml.n_saml_req 0

saml.n saml resp 0

saml.n saml auth success 0

saml.n saml auth fail 0

saml.n saml num assertion attr 0

saml.n saml num max attr 0

saml.n_saml_relay_max_len 0

saml.n_saml_relay_encode fail 0

saml.n_saml_relay_decode_fail 0

saml.n_saml relay over limit 0

saml.n_grpsid_query_sent 0

saml.n_grpsid_query_fail 0

saml.n_grp_fnbamd_fail 0

saml.n_grp_fail 0

saml.n_dc_query_sent 0

saml.n_dc_cached_hit 0

saml.n_err_queue_ses 0

saml.n_err_clk_skew 0

saml.n_err_assertion_coin 0

saml.n_err_assertion_invl 0

saml.n_err_assertion_audience 0

saml.n_err_assertion_attr 0

saml.n_err_provider 0

saml.n_err_signature 0

saml.n_err_signing_algo 0

saml.n_err_internal 0

saml.n_err_invalid_req 0

saml.n_err_lasso 0

basic.n_basic_req now 0 max 0 total 0

basic.n_basic_auth_success 0

basic.n_basic_auth_fail 0

cert.n_cert_req now 0 max 0 total 0

cert.n_cert_auth_success 0

cert.n_cert_auth_fail 0

cookie.n_cookie_req now 0 max 0 total 0

cookie.n_cookie_auth_succes 0

cookie.n_cookie_auth_fail 0

digest.n_digest_req now 0 max 0 total 0

digest.n_digest_auth_success 0

digest.n_digest_auth_fail 0

digest.n_auth_staled 0

digest.n_active_digest_nounce 0

digest.n_digest_nounce 0

fsae.n_fsae_req now 0 max 0 total 0

fsae.n fsae auth success 0

fsae.n_fsae_auth_fail 0

krb.n_krb_req now 0 max 0 total 0

krb.n_krb_auth_success 0

krb.n krb auth fail 0

mix.n_mix_req now 0 max 0 total 0

mix.n mix auth success 0

mix.n_mix_auth_fail 0

ntlm.n_ntlm req now 0 max 0 total 0

ntlm.n_ntlm auth success 0

ntlm.n_ntlm_auth_fail 0

pkey.n_pkey_req now 0 max 0 total 0

pkey.n_pkey_auth_success 0

pkey.n_pkey_auth_fail 0

rsso.n_rsso req now 0 max 0 total 0

rsso.n_rsso_auth_success 0

rsso.n rsso auth fail 0

user_query.n_user_query_req now 0 max 0 total 0

user_query.n_user_query_auth_success 0

user_query.n_user_query_auth_fail 0

FortiNBI new features and changes

The following sections describe new features, enhancements, and changes in FortiNBI.

Refer to the FortiNBI Deployment Guide for general information about deploying and using FortiNBI.

Upgrade FortiNBI independently without upgrading FortiProxy

You can now upgrade your FortiNBI version independently without upgrading your FortiProxy version by uploading a FortiNBI installer to FortiProxy using the following command: execute upload fortinbi-installer tftp <filename> <tftp-ip>. See example output below:

FPXVULTM23000034 # exe upload fortinbi-installer tftp fortinbi-installer.exe.21.tar.gz 10.100.1.205
Preparing file import 'fortinbi-installer.exe.21.tar.gz' from tftp server '10.100.1.205'
Importing file 'fortinbi-installer.exe.21.tar.gz' from tftp server '10.100.1.205'
#####
########
FortiNBI installer (version: 1.0.6.21) upload and verification succeeds.
A restart of WAD is required for the installer to be ready.
Do you want to continue? (y/n)y
Restart WAD... done
A restart of WAD daemon is required for the new FortiNBI installer to take effect. You can check the current FortiNBI version in the About tab of the FortiNBI application.

Support for Windows built-in Linux graphics

(Windows 10 21H2, 22H2) The isolator module adds support for Windows built-in Linux graphics with sound support and performance improvement. To configure the FortiNBI isolator module to use the Windows built-in Linux graphics, run the wsl --update command and install the software. Alternatively, configure Windows Update in one of the following ways:

Use the following toggle in the Settings tab to switch the graphics mode. When off, the old graphic engine is used.

FortiNBI

StatusRating server detection modeAutomatic
SettingsUse Microsoft graphics for LinuxOn
About

New Start and Stop buttons

FortiNBI 1.0.6 adds the Start and Stop buttons for you to manually start or stop a specific service.

FortiNBI

StatusRating serviceStopped
SettingsRating service connectionDisconnected
AboutRating server detection modeAutomatic
Rating server
IsolatorStopped

Improvements to collecting debug logs

FortiNBI 1.0.6 collects debug logs into a single archive file accessible via the new Collect user logs and Collect all logs buttons in the About tab. The Collect user logs button collects logs for the user while the Collect all logs button collects the user's logs AND service logs. Privilege is required to access service logs to protect other users' data on the machine.

FortiNBI

StatusNBI
SettingsFortiNBI 1.0.7.31
About

More informative error messages

The error messages now include more context information to help with troubleshooting.

Error

The isolator failed to start:

Isolator restarts on unexpected error

The isolator now automatically restarts on unexpected error. If the error persists, the isolator attempts to restart again after 10 minutes.

Product integration and support

The following table lists product integration and support information for FortiProxy 7.4.3 build 587:

TypeProduct and version
FortiProxy appliance
  • FPX-400E
  • FPX-2000E
  • FPX-4000E
  • FPX-400G
  • FPX-2000G
  • FPX-4000G
FortiProxy VM
  • FPX-AZURE
  • FPX-HY
  • FPX-KVM
  • FPX-KVM-ALI
  • FPX-KVM-AWS
  • FPX-KVM-GCP
  • FPX-KVM-OPC
  • FPX-VMWARE
  • FPX-XEN
Fortinet products
  • FortiOS 6.x and 7.0 to support the WCCP content server
  • FortiOS 6.0 and 7.0 to support the web cache collaboration storage cluster
  • FortiManager - See the FortiManager Release Notes.
  • FortiAnalyzer - See the FortiAnalyzer Release Notes.
  • FortiSandbox and FortiCloud FortiSandbox - See the FortiSandbox Release Notes and FortiSandbox Cloud Release Notes.
  • Fortilsolator 2.2 and later - See the Fortilsolator Release Notes.
Fortinet Single Sign-On (FSSO)5.0 build 0301 and later (needed for FSSO agent support OU in group filters)
  • Windows Server 2019 Standard
  • Windows Server 2019 Datacenter
  • Windows Server 2019 Core
  • Windows Server 2016 Datacenter
  • Windows Server 2016 Standard
  • Windows Server 2016 Core
  • Windows Server 2012 Standard
  • Windows Server 2012 R2 Standard
  • Windows Server 2012 Core
  • Windows Server 2008 64-bit (requires Microsoft SHA2 support package)
  • Windows Server 2008 R2 64-bit (requires Microsoft SHA2 support package)
TypeProduct and version
  • Windows Server 2008 Core (requires Microsoft SHA2 support package)
  • Novell eDirectory 8.8
Web browsers
  • Microsoft Edge
  • Mozilla Firefox version 87
  • Google Chrome version 89
Virtualization environments

Other web browsers may work correctly, but Fortinet does not support them.

Fortinet recommends running the FortiProxy VM with at least 4 GB of memory because the AI-based Image Analyzer uses more memory compared to the previous version.

HyperV
  • Hyper-V Server 2008 R2, 2012, 2012R2, 2016, and 2019
Linux KVM
  • RHEL 7.1/Ubuntu 12.04 and later
  • CentOS 6.4 (qemu 0.12.1) and later
Xen hypervisor
  • OpenXen 4.13 hypervisor and later
  • Citrix Hypervisor 7 and later
VMware
  • ESXi versions 6.5, 6.7, and 7.0
Openstack
  • Ussuri
Nutanix
  • AHV
Cloud platforms
  • AWS (Amazon Web Services)
  • Microsoft Azure
  • GCP (Google Cloud Platform)
  • OCI (Oracle Cloud Infrastructure)
  • Alibaba Cloud

Deployment information

You can deploy the FortiProxy on a FortiProxy unit or VM. You can also upgrade or downgrade an existing FortiProxy deployment. Refer to Product integration and support on page 17 for a list of supported FortiProxy units and VM platforms.

Downloading the firmware file

  1. Go to https://support.fortinet.com.
  2. Click Login and log in to the Fortinet Support website.
  3. From the Support > Downloads menu, select Firmware Download.
  4. In the Select Product dropdown menu, select FortiProxy.
  5. On the Download tab, navigate to the FortiProxy firmware file for your FortiProxy model or VM platform in the Image Folders/Files section. .out files are for upgrade or downgrade. .zip and .gz files are for new deployments.
  6. Click HTTPS to download the firmware that meets your needs.

Deploying a new FortiProxy appliance

Refer to the FortiProxy QuickStart Guide for detailed instructions of deploying a FortiProxy appliance. Refer to Product integration and support on page 17 for a list of supported FortiProxy units.

Deploying a new FortiProxy VM

Refer to the FortiProxy Public Cloud or FortiProxy Private Cloud deployment guides for more information about how to deploy the FortiProxy VM on different public and private cloud platforms. Refer to Product integration and support on page 17 for a list of supported VM platforms.

Upgrading the FortiProxy

FortiProxy 7.4.3 supports upgrade from the following versions only:

To upgrade FortiProxy units or VMs from 7.2.5 or later to 7.4.3:

  1. In the GUI, go to System > Fabric Management.
  2. Select the device you want to upgrade in the table and click Upgrade.
  3. Click Browse in the File Upload tab.
  4. Select the file on your PC and click Open.
  5. Click Confirm and Backup Config.
  6. Click Continue.

The configuration file is automatically saved and the system will reboot.

  1. Click Reset All Dashboards in the GUI to avoid any issues with FortiView.

If you are currently using FortiProxy 2.0.x or 7.0.x, Fortinet recommends that you perform the upgrade procedure for each major version in between from low to high before attempting to upgrade to 7.4.3. For example, to upgrade from 2.0.12 to 7.4.3, upgrade to 7.0.11 or later first, and then 7.2.5 or later (reboot before upgrading to 7.2.x), and then 7.4.3.

Upgrading a FortiProxy 2.0.5 VM to 7.0.x requires a different upgrade process with additional backup and configuration as FortiProxy 2.0.6 introduced a new FortiProxy VM license file that cannot be used by earlier versions of the FortiProxy VM.

To upgrade a FortiProxy 2.0.5 VM to 7.0.x:

  1. Back up the configuration from the GUI or CLI. Make sure the VM license file is stored on the PC or FTP or TFTP server.
  2. Shut down the original VM.
  3. Deploy the new VM. Make sure that there is at least 4 GB of memory to allocate to the VM.
  4. From the VM console, configure the interface, routing, and DNS for GUI or CLI access to the new VM and its access to FortiGuard.
  5. Upload the VM license file using the GUI or CLI.
  6. Restore the configuration using the CLI or GUI.
  7. Click Reset All Dashboards in the GUI to avoid any issues with FortiView.

Downgrading the FortiProxy

Downgrading FortiProxy 7.4.3 to previous firmware versions results in configuration loss on all models. Only the following settings are retained:

You can downgrade FortiProxy units or VMs from 7.4.3 to 7.2.x by following the steps below:

  1. In the GUI, go to System > Fabric Management.
  2. Select the device you want to upgrade in the table and click Upgrade.
  3. Click Browse in the File Upload tab.
  4. Select the file on your PC and click Open.
  5. Click Confirm and Backup Config.
  6. Click Continue.

The configuration file is automatically saved and the system will reboot.

  1. Click Reset All Dashboards in the GUI to avoid any issues with FortiView.

To downgrade from FortiProxy 7.4.3 to 7.0.x or 2.0.x, Fortinet recommends that you perform the downgrade procedure for each major version in between from high to low before attempting to downgrade to the target version. For example, to downgrade from 7.4.3 to 2.0.12, downgrade to 7.2.5 or later first, and then 7.0.11 or later, and then 2.0.12.

Downgrading a FortiProxy 7.0.x VM to 2.0.5 or earlier requires a different downgrade process with additional backup and configuration as FortiProxy 2.0.6 introduced a new FortiProxy VM license file that cannot be used by earlier versions of the FortiProxy VM.

To downgrade a FortiProxy 7.0.x VM to FortiProxy 2.0.5 or earlier:

  1. Back up the configuration from the GUI or CLI. Make sure the VM license file is stored on the PC or FTP or TFTP server.
  2. Shut down the original VM.
  3. Deploy the new VM. Make sure that there is at least 2 GB of memory to allocate to the VM.
  4. From the VM console, configure the interface, routing, and DNS for GUI or CLI access to the new VM and its access to FortiGuard.
  5. Upload the VM license file using the GUI or CLI.
  6. Restore the configuration using the CLI or GUI.
  7. Click Reset All Dashboards in the GUI to avoid any issues with FortiView.

Resolved issues

The following issues have been fixed in FortiProxy 7.4.3. For inquiries about a particular bug, please contact Customer Service & Support.

Bug IDDescription
985560Application IDs do not show up in CLI.
972058Proxy inline IPS service should be "HTTPS" instead of "https" in IPS log for HTTPS traffic.
985686OpenSSL fails to encrypt and decrypt VD licenses.
982273Certificate authentication group information query fails.
982883Attack traffic for inline IPS cannot be exempted if set src-ip/dst-ip for both direction are in exempt-ip list.
982015IP addresses are removed after factory reset when more than 4 ports are configured.
968509, 968524Raw data and attack context are missing from inline IPS log.
985198IP address threat feed connection status indicates "Other Error".
955481When fast-policy-match is enabled, traffic is matched to wrong policy during a specific period of time.
983897CLI should not allow the FTP protocol in config web-proxy isolator-server.
980527External-resource type other than address and domain are not filtered out for firewall.policy.dstaddr6 and srcaddr6.
980994Access to secondary unit is not granted when you use the SVI interface for management in HA.
977734When configuring ipv6 addresses in the CLI, all types of external-resource for ipv6 address are listed. Only the external-resources of type "domain" and "address" should be listed.
979936WAD crash on wad_secure_webproxy_ssl_set.
986971IPS filter type protocol does not detect matched signature and bypass traffic with proxy inline-ips enabled.
948042Failed to create VDOM with a name longer than 11 characters in the CLI when long-vdom-name is enabled.
984179Application Control profile does not work on non-root VDOM.
984948Crash during smtp-over-http.
988098Policy with dnat vip is denied when log-http-transaction is set to "all".
976775When policy based routing is configured and traffic is redirected to WAD, traffic from the FortiProxy back to the client is routed via static routing.
980297GUI shows empty remote groups while CLI configuration shows the correct remote group configuration.
980702URL rating lookup does not support valid URLs with forward slash.
987777Policy ID is not available for disabled policies in the FortiProxy GUI.
974938Remove references to unsupported features in FortiProxy log IDs.
978473URL local/user category rating result shows only one best match category but not the other matched local/user categories configured in the profile.
982156Configuration value of the interface IP address should not be synced within a FortiProxy HA cluster on Azure.
982637Cannot start a capture in a non-root VDOM.
985485FortiProxy interface does not respond when HA has multiple vclusters.
947928In Policy & Objects > Proxy Auth Settings, you cannot unset a CA certificate once it is set.
964747No method legend in User Monitor widget.
990142Interfaces with no members are allowed to be aggregated in GUI.
773815AD group cache update issue.
988544Crash in WAD user-info process.
986806Cannot use HA reserved management interface to send log to FortiAnalyzer.
988402Anti-virus incorrectly blocks the upload of good Excel files to OneDrive with corrupted archive error.
982614Crash on building fast match table when the source interface is configured with an empty system zone.
989515Traffic that should get IPS scanned passes through when IPS is out of service.
967538HA is out of sync after automatic reboot.
985374ICAP is unable to bypass when ICAP remote server is offline and health-monitor is disabled.
981069On a non-root VDOM with multiple explicit-web entries, changes to policies are not applied properly.
981546FortiProxy do not send authentication request after proxy-re-authentication-time is passed.
987387Buffer overflow and format string vulnerabilities.
981193Packet capture warning message is irrelevant and confusing.
972919Config restore takes the device into system maintenance mode and makes it inaccessible.
992186utmref is missing in forward traffic logs with http transaction log enabled.
989621AV proxy profile causes issues with SMB access.
977905HA secondary acts like primary in vcluster1 after the switch of primary and secondary in vluster2.
990161WAD procmgr hangs on waitpid.
983371Incorrect output when viewing FortiView Proxy Policy with source set to FortiAnalyzer.
977645Unable to allow the connections to match existing configured policy.
991641Unable to save changes shaping policy when dstaddr6 is set to be an IPv6 FQDN address with wildcard (*).
993581GUI DLP rules ID duplicate issue when you delete one and add another.
993799Remove Fabric Overlay Orchestrator from GUI.
993597WAD crashes when user LDAP server is configured.
915834HA active-passive flip: standby FortiProxy tries to reach out to FortiGuard services through HA port.
987687"Can not create query" error while deleting VDOMs.
988015, 992933"sysctl ifconfig" does not work when the interface belongs to a non-root VDOM.
989798Out-of-bounds write in SSL VPN.
983298Forward logs for non-root VDOM are only visible in root VDOM.
992167Providing an invalid client certificate during certificate authentication can create a redirection loop.
989784Access to other users' bookmarks in SSL VPN web mode.
979936When configuring ipv6 addresses in the CLI, all types of external-resource for ipv6 address are listed. Only the external-resources of type "domain" and "address" should be listed.
980994External-resource type other than address and domain are not filtered out for firewall.policy.dstaddr6 and srcaddr6.
988016Aggregate interface is not initialized on startup when the aggregate is in a non-root VDOM.
982716False warning "unresovled FQDN" for all FQDN addresses other than wildcard FQDN.
956570, 975752, 990586, 991059Inline CASB UTM log issues.
980924, 983161Inline CASB upgrade issues.
993080Irrelevant fields in the VDOM configuration window in GUI.
989660, 989668rawdataid/rawdata, forwardedfor, and trueclntip are missing from inline IPS utm log.
983856"unknown-1" is listed in FortiView proxy applications tab.
995824Counter value returns 0 for non-root interface when polling via SNMP.
994749URL filter fails to block transparent HTTPS traffic with IP hostname.
868634Bypass of root file system integrity checks at boot time.
993166When managed by FortiManager, HA-mode FortiPoxy triggers an auto update every 30 minutes.
999664Unable to allow the connections to match existing configured policy.
923920ICAP 204-response is not shown correctly and cannot be edited in GUI.
986713After configuration restore, the device changes to system maintenance mode and becomes inaccessible.
993506Remove CLI for in band HA management, which is not supported by FortiProxy.
975759When multiple control options are taking action in inline CASB, only the first action generates a UTM log.

FortiNBI

The following issues have been fixed in FortiNBI. For inquiries about a particular bug, please contact Customer Service & Support.

Bug IDDescription
886077, 930915, 934251, 956123, 959594, 962908, 977250, 979177, 993669, 989676, 996544, 996542, 988642FortiNBI bug fixes.
959232Crash when downloading the FortiNBI installer.
959263FortiNBI rating error and all pages are broken in the FortiNBI application.
N/ALog collection fails if the isolator is not installed.
N/AInstability issues caused by isolator state tracking.
N/AIsolator download timeout is too long.
N/AService state are not accurate in edge scenarios during restart.
N/AGUI is unavailable due to a broken link to Windows App SDK.
N/ANo timeout when task fails to start repeatedly.

Common vulnerabilities and exposures

FortiProxy 7.4.3 is no longer vulnerable to the following CVE references. Visit https://fortiguard.com/psirt for more information.

Bug IDCVE reference
985058CVE-2024-21754
985049CVE-2024-23111
989784CVE-2024-23112
989798CVE-2024-21762
993863CVE-2024-23113
868634CVE-2023-28002
993863CVE-2024-23113
985058CVE-2024-21754

Known issues

FortiProxy 7.4.3 includes the known issues listed in this section. For inquiries about a particular bug, please contact Customer Service & Support.

Bug IDDescription
999491No access to Intranet application with " 401 unauthorized" error.
996875Traffic is failing because the replacement certificate created by FortiProxy during DPI does not contain CRL or OCSP.
994780Security rating does not work as expected.
992748Issue with detecting patterns with DLP.
987572Cannot access FortiProxy via GUI.
1005060Ingress traffic shaper hits a bandwidth throttle that cannot be more than 2.5 Gbps.
Workaround: Use egress shaper for better scalability.
1060812Inline IPS botnet does not work for transparent proxy.

FortiNBI

The following issues have been identified in FortiNBI. For inquiries about a particular bug, please contact Customer Service & Support.

Bug IDDescription
975570Certificate warning when starting up the isolator.
Workaround: Ignore the certificate warning.
881957Error in Google Chrome or Microsoft Edge login page when FortiNBI is on.
Workaround: Use Firefox.

PDF preview unavailable. Download the PDF instead.

fortiproxy-7.4.3-release-notes madbuild

Related Documents

Preview FortiProxy Data Sheet: Secure Web Gateway Solutions
Fortinet's FortiProxy Data Sheet details its capabilities as a secure web gateway, offering advanced threat protection, web filtering, DNS filtering, application control, and WAN optimization for enterprise network security.
Preview FortiManager 6.4.9 Release Notes
Official release notes for Fortinet's FortiManager version 6.4.9, detailing new features, resolved issues, and known issues for network security management.
Preview FortiOS 6.4.3 Release Notes
Official release notes for FortiOS version 6.4.3, detailing new features, enhancements, resolved issues, and known issues for Fortinet's network security operating system. Includes supported models and upgrade information.
Preview FortiOS 7.4.2 Release Notes - Fortinet
Official release notes for FortiOS 7.4.2 by Fortinet, detailing new features, enhancements, resolved issues, and known issues for Fortinet's network security operating system.
Preview FortiAnalyzer 7.4.7 Release Notes
FortiAnalyzer 7.4.7 Release Notes detail updates, special notices, upgrade information, product integration, and resolved/known issues for Fortinet's log management and security analysis platform.
Preview FortiOS 7.4.0 Release Notes: New Features, Fixes, and Updates
Explore the FortiOS 7.4.0 release notes from Fortinet, detailing new features, enhancements, resolved issues, known issues, and upgrade information for their network security operating system.
Preview FortiOS 7.2.11 Release Notes
Comprehensive release notes for Fortinet FortiOS 7.2.11, detailing new features, changes, resolved issues, known issues, and supported hardware models for network security.
Preview FortiManager VM Install Guide
A comprehensive guide to installing the FortiManager VM virtual appliance across various virtualization environments, including Citrix XenServer, Microsoft Hyper-V, KVM, Open Xen, VMware vSphere, and Amazon Web Services (AWS).