Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Carl_Wallmark
Valued Contributor

FortiOS 5.2.1 is out

.

FCNSA, FCNSP
---
FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30B
FortiAnalyzer 100B, 100C
FortiMail 100,100C
FortiManager VM
FortiAuthenticator VM
FortiToken
FortiAP 220B/221B, 11C

FCNSA, FCNSP---FortiGate 200A/B, 224B, 110C, 100A/D, 80C/CM/Voice, 60B/C/CX/D, 50B, 40C, 30BFortiAnalyzer 100B, 100CFortiMail 100,100CFortiManager VMFortiAuthenticator VMFortiTokenFortiAP 220B/221B, 11C
46 REPLIES 46
netmin
Contributor II

Looks like session-history and threat-history widgets are gone. Also, web cache exemptions were removed from the GUI.
daveywavey
New Contributor

No problems with 90DWifi resolved many issues I had. On the 80CMWifi though had a major issue " ehci_hcd 5035" which caused the device to keep cycling through the boot process, I had to select boot from previous firmware and I got back up. Anyone else with this issue?
Forti OS 4.0: FLG_100B-v400-build0705 (4.3.7) FWF_80CM-v400-build0665 (4.3.15) Forti OS 5.0: FWF_90D-v500-build0228 (5.0.3)
Forti OS 4.0: FLG_100B-v400-build0705 (4.3.7) FWF_80CM-v400-build0665 (4.3.15) Forti OS 5.0: FWF_90D-v500-build0228 (5.0.3)
Nihas
New Contributor

5.2.1GUI is more faster than 5.2.0 version, although Fortiview takes more time to load the contents.
Nihas [\b]
Nihas [\b]
Christopher_McMullan

daveywavey, I would open a ticket about that. I' ve dealt with similar cases recently. You' d be best advised to provide us more diagnostics to see what needs to be done.

Regards, Chris McMullan Fortinet Ottawa

emnoc
Esteemed Contributor III

I have to agreed that 5.2.1 WebGui is balazng faster than 5.2. I did drop-all forticloud and logging.

PCNSE 

NSE 

StrongSwan  

PCNSE NSE StrongSwan
ShrewLWD
Contributor

Does anyone know if the device detection is updated along with UTM downloads? The documentation calls it the Device Visibility Database, but I can' t find anything about how frequently that gets updated. Reason I ask is, in 5.2.1 (on a 100D not yet attached to the internet, and a FAP210B) it is detecting an iPhone5 with iOS8 and a laptop with Windows 8.1, as ' Other Network Device' It is detecting a Lenovo workstation and a laptop, both with Windows 7, correctly. It is detecting a Samsung Galaxy phone as a Linux PC (I know, Android is Linux, but it shouldn' t detect it as a Linux PC). If it is embedded in the firmware, that would be pretty bad, to have to wait for a firmware update.
Christopher_McMullan

Do the categorizations for the devices stay the same over time? Are all of them browsing the web? Device Identification makes use of MAC manufacturer codes, VCI identifiers in DHCP broadcasts, information in SYN packets, and HTTP user-agent strings. Obviously, not all of this information is available at once. If a host connects, but never generates HTTP port 80 traffic, then all you would have to go on are MAC addresses, if the manufacturer is well-known and matches the brand of the device, and any leaked identity information from NetBIOS traffic, the DHCP broadcast, etc. Are any devices connecting from behind a Layer-3 device where others connect more directly? Another limitation is that the MAC address is how the FortiGate references each device, so if more than one device is sourced from behind the same MAC (i.e., from a router or L3 switch), then the FortiGate has no way of knowing who is ultimately generating the traffic. Best to move this thread to a new topic eventually, if it goes beyond simple answers.

Regards, Chris McMullan Fortinet Ottawa

AndreaSoliva
Contributor III

Hi one thing I was wondering: I configured on 5.2.1 a IPSec FortiClient based on template. All fine. If I would like to do a IP pool static route to the phase1 interface I recognized there is not anymore a ipsec phase1 interface to be used for the static route. If I look to the monitor no routing. From this point of view I tried to connect with the 5.2 client latest version and all is working fine. On the client the route is for splitting there as on lan the client can be reached by icmp. Because I do not like such autom. configuration (like SSL VPN) I disable this stuff by default. I looked to the cli for phase1-interface and could only find the opton " add-route" . I tried to set to disable which was possible but as soon as you give the write commend with " end" there is a funny error which indicates must be a /30 sunbet defined for IP Pool....what the hell....a /30 Subnet for IP Pool? Using a 60D for tests....anyonelse noticed this behaviour? have fun Andrea
AndreaSoliva
Contributor III

Hi as you know in FortiOS 5.2 all what is smaller as 100D Disk for logging is not anymore available except 90D etc. ref to Software Matrix. Anyway for my 60D I configured memory logging which means: # config log memory setting # set status enable # set diskfull overwrite # end # config log memory filter # set severity information # set forward-traffic enable # set local-traffic enable # set multicast-traffic enable # set sniffer-traffic enable # set anomaly enable # set netscan-discovery enable # set netscan-vulnerability enable # set voip enable # set dlp-archive enable # end # config log gui-display # set location memory # set resolve-hosts enable # set resolve-apps enable # end # config log setting # set fwpolicy-implicit-log enable # set local-in-allow disable # set local-in-deny-unicast disable # set local-in-deny-broadcast disable # set local-out disable # set resolve-ip enable # set resolve-port enable # set user-anonymize disable # set daemon-log enable # set neighbor-event disable # set brief-traffic-format disable # end First thing which I do not understand is the filter and not even for memory meaning all filter for syslogd (local0), for faz as for memory are by default on " warning" which means at all even all right configured no logging only for warning which is nonsense. Anyway I used information which means everything. Now I can see the logs but the behaviour ON A FORTI WHICH HAS NOTHING TO DO meaning less traffic etc. the traffic appreas in the forward log and after 1 minute dissapears. Second thing is absolutly no logging for SSL-VPN....nothing absolut nothing! Both issues seems to me a bug? Anyone else recognized this? have fun Andrea
Matthew_Mollenhauer
New Contributor III

Anyone had any success managing a 5.2.1 unit from a 5.2.0 FortiManager? Release notes say it' s supported but I' ve seen issues in the past using a FortiGate that is ahead of the FMG, and I' m a little worried about testing it. Regards, Matthew
Labels
Top Kudoed Authors