Fortios 5.0.12 Release Notes
Fortios 5.0.12 Release Notes
Fortios 5.0.12 Release Notes
VERSION5.0.12
FORTINET DOCUMENTLIBRARY
http://docs.fortinet.com
FORTINETVIDEOGUIDE
http://video.fortinet.com
FORTINETBLOG
https://blog.fortinet.com
CUSTOMERSERVICE&SUPPORT
https://support.fortinet.com
FORTIGATECOOKBOOK
http://cookbook.fortinet.com
FORTINETTRAININGSERVICES
http://www.fortinet.com/training
FORTIGUARDCENTER
http://www.fortiguard.com
ENDUSER LICENSE AGREEMENT
http://www.fortinet.com/doc/legal/EULA.pdf
FEEDBACK
Email: techdocs@fortinet.com
TABLEOFCONTENTS
Change Log
Introduction
Supported models
Special Notices
Default log setting change
FG-300D and FG-500D nTurbo support
FG-3600C hardware compatibility
SCTP firewall support
New FortiOS Carrier features
Changes to licensing
Changes to GPRS Tunneling Protocol (GTP) support
Changes to MMS scanning
Using wildcard characters when filtering log messages
IPS algorithms
Disk logging disabled by default on some models
WAN Optimization
MAC address filter list
Spam filter profile
Spam filter black/white list
DLP rule settings
Limiting access for unauthenticated users
FG-100D upgrade and downgrade limitations
FG-100D hardware compatibility
Upgrade Information
Upgrading from FortiOS version 5.0.10 or later
Upgrading from FortiOS version 4.3.16 or later
Downgrading to previous firmware versions
FortiGate VM firmware
Firmware image checksums
5
6
6
8
8
8
8
8
9
9
9
10
10
10
10
11
11
12
12
12
12
13
14
15
15
15
15
16
16
17
17
19
20
21
Resolved Issues
Known Issues
Limitations
Add device access list
Citrix XenServer limitations
Open Source XenServer limitations
21
22
22
24
29
31
31
31
32
Change Log
Change Log
Date
Change Description
2015-05-15
Initial release.
Release Notes
Fortinet, Inc.
Introduction
This document provides the following information for FortiOS version 5.0.12 build 0318:
l
Supported models
Special Notices
Upgrade Information
Resolved Issues
Known Issues
Limitations
Supported models
FortiOS version 5.0.12 supports the following models:
FortiGate
FG-20C, FG-20C-ADSL-A, FG-30D, FG-30D-POE, FG-40C, FG-60C, FG60C-POE, FG-60C-SFP, FG-60D, FG-60D-POE, FG-70D, FG-80C, FG80CM, FG-80D, FG-90D, FG-90D-POE, FG-92D, FG-94D-POE, FG-98DPOE, FG-100D, FG-110C, FG-111C, FG-140D, FG-140D-POE, FG-140DPOE-T1, FG-200B, FG-200B-POE, FG-200D, FG-240D, FG-280D-POE,
FG-300C, FG-300D, FG-310B, FG-310B-DC, FG-311B, FG-500D, FG600C, FG-620B, FG-620B-DC, FG-621B, FG-800C, FG-1000C, FG1200D, FG-1240B, FG-1500D, FG-3016B, FG-3040B, FG-3140B, FG3240C, FG-3600C, FG-3700D, FG-3810A, FG-3950B, FG-3951B, FG5001A, FG-5001B, FG-5001C, FG-5001D, FG-5101C
FortiWiFi
FortiGate Rugged
FGR-60D, FGR-100C
FortiGate VM
FortiSwitch
FS-5203B
FortiOS Carrier
The following models are supported on branches based off a branch point of build 0318:
Release Notes
Fortinet, Inc.
Introduction
Supported models
FGR-90D
FG-98D-POE
FG-1000D
FG-1200D
FG-VM64-AWS
FG-VM64-AWSONDEMAND
Release Notes
Fortinet, Inc.
Special Notices
Default log setting change
For FortiGate 2U and 3U models (FG-3600, FG-3700, FG-3800, and FG-3900 series devices) and 5000 series blades,
the log disk is disabled by default. It can only be enabled via the Command Line Interface (CLI). For all 1U and
desktop models that support STAT disk, the log disk is enabled by default.
Release Notes
Fortinet, Inc.
Special Notices
The license key is case-sensitive and includes dashes. When you enter this command, FortiOS attempts to verify the
license with the FortiGuard network. Once the license is verified the FortiGate unit reboots. When it restarts it will be
running FortiOS Carrier with a factory default configuration.
You can also request that Fortinet apply the FortiOS Carrier Upgrade license prior to shipping a new unit, as part of
Professional Services. The new unit will arrive with the applied license included.
Release Notes
Fortinet, Inc.
Special Notices
Including both * wildcard characters will find all messages with logged in them. logged can be at the start or the end
of the message or inside the message.
If you only want to find messages that begin with the search term you should remove the leading *. If you only want to
find messages that end with the search term you need to remove the trailing *.
It does not work to add a * wildcard character inside the search term. So searching for *lo*ed* will not return any
results.
IPS algorithms
For optimal performance on your FortiGate unit, the IPS algorithm can be configured via the CLI. Select one of the
following modes:
l
low: This algorithm works best on FortiGate units with less memory (512MB or less)
super: This algorithm works best on FortiGate models with more memory (more than 4GB)
Release Notes
Fortinet, Inc.
10
Special Notices
FortiWiFi
WAN Optimization
FWF-20C, FWF-20C-ADSL-A, FWF-40C, FWF-60C, FWF-60CM, FWF-60CX-ADSLA, FWF-60D, FWF-60DM, FWF-60DX-ADSL-A, FWF-80C, FWF-80CM,
If you were logging to FortiCloud prior to upgrading to FortiOS version 5.0.12, the settings are retained and logging to
FortiCloud continues to operate normally. If you were logging to disk prior to upgrading, logging to disk may be
disabled during the upgrade process.
If required, you can enable disk logging from the CLI using the following command:
config log disk setting
set status enable
end
If you enable disk logging on the models listed above, the CLI displays a message reminding you that enabling disk
logging impacts overall performance and reduces the lifetime of the unit.
A code limitation specific to the FG-80C, FG-80CM, FWF-80C, and FWF-80CM models prevents the warning
message from being displayed.
WAN Optimization
In FortiOS version 5.0, WAN Optimization is enabled in security policies and WAN Optimization rules are no longer
required. Instead of adding a security policy that accepts traffic to be optimized and then creating WAN Optimization
rules to apply WAN Optimization, in FortiOS version 5.0 you create security policies that accept traffic to be optimized
and enable WAN Optimization in those policies. WAN Optimization is applied by WAN Optimization profiles which are
created separately and added to WAN Optimization security policies.
11
Release Notes
Fortinet, Inc.
Special Notices
Release Notes
Fortinet, Inc.
12
Special Notices
The open use PCs have limited access to the Internet. Employee PCs can access internal resources and have
unlimited access to the Internet.
To support these different levels of access you can add a user identity policy to the top of the policy list that allows
authenticated users to access internal resources and to have unlimited access to the Internet. In this policy, select
Skip this policy for unauthenticated user.
Add a normal firewall policy below this policy that allows limited access to the Internet.
Sessions from authenticated PCs will be accepted by the User Identity policy. Sessions from unauthenticated PCs will
skip the User Identity policy and be accepted by the normal firewall policy.
13
Release Notes
Fortinet, Inc.
Special Notices
Release Notes
Fortinet, Inc.
14
Upgrade Information
Upgrading from FortiOS version 5.0.10 or later
FortiOS version 5.0.12 supports upgrading from version 5.0.10 or later.
HA Virtual MACaddresses are created for each FortiGate interface based on the interface index number. Between FortiOS 5.0.9 and 5.0.10 interface indexing changed.
After upgrading a cluster to FortiOS 5.0.0, the Virtual MAC addresses assigned to individual FortiGate interfaces may be different. You can use the get hardware nic
<interface name> CLI command to view the Virtual Mac address of each
FortiGate Interface
Tablesize limits
FortiOS 5.0 has changed the maximum allowable limits on some objects. As a result, the configuration for some
objects may be lost. These include:
l
Application list
DLP sensor
Firewall VIP
IPS sensor
For more information, see the Maximum Values Table for FortiOS 5.0 on the Fortinet Document Library website.
15
operation modes
interface IP/management IP
DNS settings
VDOM parameters/settings
Release Notes
Fortinet, Inc.
FortiGate VM firmware
session helpers
Upgrade Information
FortiGate VM firmware
Fortinet provides FortiGate VM firmware images for the following VM environments.
.out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
.out.OpenXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains the QCOW2 file for Open Source XenServer.
.out.CitrixXen.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains the Citrix XenServer Virtual Appliance (XVA), Virtual Hard Disk (VHD), and OVF files.
Linux KVM
l
l
.out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
.out.kvm.zip: Download the 64-bit package for a new FortiGate VM installation. This package contains
QCOW2 that can be used by qemu.
Microsoft Hyper-V
l
l
.out: Download the 64-bit firmware image to upgrade your existing FortiGate VM installation.
.out.hyperv.zip: Download the 64-bit package for a new FortiGate VM installation. This package
contains three folders that can be imported by Hyper-V Manager on Hyper-V 2012. It also contains the file
fortios.vhd in the Virtual Hard Disks folder that can be manually added to the Hyper-V Manager.
.out: Download either the 32-bit or 64-bit firmware image to upgrade your existing FortiGate VM installation.
.ovf.zip: Download either the 32-bit or 64-bit package for a new FortiGate VM installation. This package
contains Open Virtualization Format (OVF) files for VMware and two Virtual Machine Disk Format (VMDK) files
used by the OVF file during deployment.
Release Notes
Fortinet, Inc.
16
Other web browsers may function correctly, but are not supported by
Fortinet.
Explicit Web Proxy Browser
Other web browsers may function correctly, but are not supported by
Fortinet.
FortiManager
17
Release Notes
Fortinet, Inc.
FortiAP
5.0.9
FortiSwitch ATCA
2.0.3
5.2.0
Release Notes
Fortinet, Inc.
18
FortiExplorer
Language support
5.163
IPS Engine
2.199
Linux KVM
Microsoft
Virtualization Environments
Citrix
Open Source
VMware
Always review the Release Notes of the supported platform firmware version before
upgrading your FortiGate device.
Language support
The following table lists language support information.
Language
19
GUI
Documentation
English
Chinese (Simplified)
Chinese (Traditional)
Release Notes
Fortinet, Inc.
Module support
Language
GUI
Documentation
French
Japanese
Korean
Portuguese (Brazil)
Spanish (Spain)
To change the FortiGate language setting, go to System > Admin > Settings, in View Settings > Language select the
desired language from the drop-down menu.
Module support
FortiOS version 5.0.12 supports Advanced Mezzanine Card (AMC), Fortinet Mezzanine Card (FMC), Rear Transition
Module (RTM), and Fortinet Storage Module (FSM) removable modules. These modules are not hot swappable. The
FortiGate unit must be turned off before a module is inserted or removed.
Module
FortiGate Model
Module: ASM-S08
Type: Storage
Module: FSM-064
Type: Storage
Module: ASM-FB4
Type: Accelerated interface
Module: ADM-XB2
Type: Accelerated interface
FG-3810A, FG-5001A
Module: ADM-FB8
Type: Accelerated interface
FG-3810A, FG-5001A
Module: ASM-FX2
Type: Bypass
Module: ASM-CX4
Type: Bypass
Module: ASM-CE4
Type: Security processing
Release Notes
Fortinet, Inc.
20
Module
FortiGate Model
Module: ADM-XE2
Type: Security processing
FG-3810A, FG-5001A
Module: ADM-XD4
Type: Security processing
FG-3810A, FG-5001A
Module: ADM-FE8
Type: Security processing
FG-3810A
Module: RTM-XD2
Type: Rear transition
FG-5001A
Module: ASM-ET4
Type: Security processing
FG-310B, FG-311B
Module: RTM-XB2
Type: Rear transition
FG-5001A
Module: FMC-XG2
Type: Security processing
FG-3950B, FG-3951B
Module: FMC-XD2
Type: Accelerated interface
FG-3950B, FG-3951B
Module: FMC-F20
Type: Accelerated interface
FG-3950B, FG-3951B
Module: FMC-C20
Type: Accelerated interface
FG-3950B, FG-3951B
Module: FMC-XH0
Type: Security processing
FG-3950B
21
Operating System
Installer
2313
Release Notes
Fortinet, Inc.
Operating System
Installer
2313
2313
Other operating systems may function correctly, but are not supported by Fortinet.
Operating System
Web Browser
Other operating systems and web browsers may function correctly, but are not supported by Fortinet.
Antivirus
Firewall
Release Notes
Fortinet, Inc.
22
Supported Microsoft Windows 7 32-bit and 64-bit antivirus and firewall software
Product
Antivirus
Firewall
23
Release Notes
Fortinet, Inc.
Resolved Issues
The following issues have been fixed in FortiOS version 5.0.12. For inquires about a particular bug, please contact
Customer Service & Support.
Antivirus
Bug ID
Description
266432
Corruption handling by the AV-Engine and AV Database may not work as expected.
DLP
Bug ID
Description
261567
DLP and virus scan of attachments for on-premises version of OWA may not work as
expected.
ELBC
Bug ID
261371
Description
capwap for MAC lookup in Cluster Mode may not work as expected.
FIPS-CC
Bug ID
Description
272012
After rebooting backup box, fips-cc vpn config test failure may occur.
Firewall
Bug ID
Description
269863
If the response code is not 200, the Connection Upgrade Case Proxy may bypass the
session.
FortiGate-3040/3140-B
Bug ID
Description
249749
Release Notes
Fortinet, Inc.
24
Resolved Issues
FortiGate-5001C
Bug ID
Description
271652
FortiGate-VM
Bug ID
Description
250054
When there is a license status change or a warning occurs, the FortiGate-VM License
Alert may not appear in the Event Log.
FSSO
Bug ID
Description
268460
The FSSO may drop users before retrieving the complete list.
GUI
Bug ID
Description
259349
262171
Users may still be able to delete Firewall Policies in Read Only Mode.
267396
In some cases, the Top Sources widget may only report traffic only for root VDOM.
HA
25
Bug ID
Description
232458
247725
After a default timeout expiration occurs, the session duration timer on the slave may
reset.
254388
263737
The hasync may stop synchronizing the configuration if the file descriptor is
exhausted.
264836
When editing the default admin account in the CLI, it may not sync in the HA environment.
265606
The debugzone and checksum under the HA checksum may not match.
Release Notes
Fortinet, Inc.
Resolved Issues
Bug ID
Description
267249
IPSEC
Bug ID
Description
263428
266115
When handling IKEv2 SA_INIT Packet as a Responder, the iked may stop
working.
IPSEngine
Bug ID
Description
273164
Description
232768
242425
After a HA failover with multiple ISPs, the FortiAnalyzer logging over IPSec may
stop working.
254899
Routing
Bug ID
Description
275894
If OSPF type 3 routes are obtained from multiple ABRs, some of the routes may not
be installed after selected ABR flushes its type 3 routes.
SSLVPN
Bug ID
Description
247112, 265504
271439
When a website is accessed through the SSLVPNWeb Mode Bookmark, users may
not be able to upload files.
Release Notes
Fortinet, Inc.
26
Resolved Issues
System
Bug ID
Description
237288
Due to VDOM isolation, the System Admin remote group may be modified incorrectly.
240001
259681
260381
When there is a null trusthost betwen the valid trusthosts, the Admin
User may not be able to login to the FortiGate.
261669
Due to ARP Requests and NP Accelerated Sessions, high CPU usage may occur.
264367
When trying to obtain the Admin Profile from Radius, the SCP backup may not work as
expected.
264983
When users try to edit the Display Zone from the GUI, the Display Zone with the Member Interface List may be slow to load.
265245
There may not be a corresponding policy for the keepalive portal, and the redirect address may be set to the local IP. This may cause the location.href to be
the IP address instead of the auth-redirect-addr thatis configured in the policy.
267131
268654
272967, 273375
276191
Description
253682
When the Webcache is enabled and it receives the 304 Message from the Server, the
wad process may stop working.
265129
When going through two Explicit Proxies, the None Standard HTTPS Page may not
load as expected.
Webfilter
27
Bug ID
Description
182863
In some cases, the URLFilter may become stuck in the No Correct FortiGuard
Information state.
Release Notes
Fortinet, Inc.
Resolved Issues
Upgrade
Bug ID
Description
259334
261562
After upgrading from 4.3 to 5.0, the TCP Reset Settings may have changed.
274251
After upgrading to 5.0.11 or 5.2.3, the Explicit Proxy Service may not be correctly created when using the GUI.
Release Notes
Fortinet, Inc.
28
Known Issues
The following issues have been identified in FortiOS version 5.0.12. For inquires about a particular bug or to report a
bug, please contact Customer Service & Support.
Description
239968
240789
FG-3700D: LAG groups configured on low latency interfaces (port25 to port32, and
NP6_0 to NP6_1) do not function correctly.
Workaround: Only use either low-latency-mode or LAG for traffic on these interfaces.
240945
Reply traffic is not offloaded when shared traffic shaping is enabled on policies for
accelerated inter-VDOM links using the npu_vdom interface.
241646
Traffic may not pass through a VLAN interface added to a link aggregation group
(LAG) in a transparent mode VDOM.
Workaround: Run a diagnose sniffer packet on the physical interface in the transparent
mode VDOM or reboot the FortiGate unit.
242012
242298
When the FortiGate unit experiences high CPU usage, IPsec VPN packets may be
lost.
FG-80D
Bug ID
Description
235525
The link and speed LEDs remain on after shutting down the unit using the execute
shutdown command.
239619
The r8168 driver is unable to shutdown power of the port and will keep the link of the
other end in an up state.
GUI
29
Bug ID
Description
231086
A firewall policy may be deleted after a reboot if it uses an empty FSSO group.
Release Notes
Fortinet, Inc.
Known Issues
Bug ID
Description
254084
When using Microsoft Internet Explorer 9, created firewall policies are not displayed in
the Policy page. The content pane toolbar is not displayed in this page.
Routing
Bug ID
Description
228800
System
Bug ID
Description
233419
Upgrade
Bug ID
Description
243960
263340
The source address is lost and SNAT is disabled in a multicast policy after upgrading
from 4.3.
269249
When upgrading from 4.0 to 5.0 firmware, the LB VIP option set http-ipheader enable may not be preserved.
Release Notes
Fortinet, Inc.
30
Limitations
This section outlines the limitations in FortiOS version 5.0.12.
As a result, the predefined device-category entry 1 will not have network access. Only the custom device entry 2
would be able to get network access.
31
XVA (recommended)
VHD
OVF
Release Notes
Fortinet, Inc.
Limitations
The XVA format comes pre-configured with default configurations for VM name, virtual CPU, memory, and virtual
NIC. Other formats will require manual configuration before the first power on process.
Release Notes
Fortinet, Inc.
32
Copyright 2015 Fortinet, Inc. All rights reserved. Fortinet, FortiGate, FortiCare and FortiGuard, and certain other marks are registered trademarks of Fortinet, Inc., in
the U.S. and other jurisdictions, and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product or company names may be
trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and
other results may vary. Network variables, different network environments and other conditions may affect performance results. Nothing herein represents any binding
commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinets
General Counsel, with a purchaser that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such
event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any such warranty will be
limited to performance in the same ideal conditions as in Fortinets internal lab tests. In no event does Fortinet make any commitment related to future deliverables, features or
development, and circumstances may change such that any forward-looking statements herein are not accurate. Fortinet disclaims in full any covenants, representations, and
guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise revise this publication without notice, and the most
current version of the publication shall be applicable.