Fortinet Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
tanr
Valued Contributor II
3 Solutions
visk
New Contributor III

I upgraded my 60F three days ago. I using BGP, OSPF, many VPN tunnels, SSLVPN, many VLANS, seucirty policies (IPS, Webfiltering, WAF, App control). Everything looks ok, no issues for now. 

View solution in original post

Frosty

We upgraded our FG200E last weekend.  So far, so good.  No problems noticed.  We do have a fairly simple configuration though.

I have been hanging out to get v6.0.10 because it has a Bugfix in it for the problem which was causing RDP sessions over a FortiClient SSL VPN connection to keep dropping out.

Can confirm that the bugfix indeed works.  No dropouts since upgrading.

View solution in original post

tanr
Valued Contributor II

No problems so far (only 4 days).  Memory use has stayed stable.  Some longer times on DNS resolutions, but that is almost always just due to Fortiguard, the actual DNS servers used, Chromium, etc.

View solution in original post

11 REPLIES 11
isamt

Upgraded a 200D yesterday from 6.0.9 to 6.0.10

Immediately saw cpu and memory usage is lower than on 6.0.9

 

There are quite a few fixes for SSL vpn issues, so will be interested to see if some of the problems we have seen on 6.0.9 are now fixed or at least improved.

 

 

isamt

Note to those upgrading from 5.6 to 6.0 range.

 

After upgrade you may find that the public IP address of the Fortigate is pingable from any source.

There is a change in 6.0 so that trusted hosts no longer controls this behaviour.

 

You will need to create a local-in policy to allow pings to only trusted hosts.

 

refer to the following KB document:

https://kb.fortinet.com/kb/documentLink.do?externalID=FD44156