Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Valued Contributor II

6.0.10 is out!

3 Solutions
New Contributor III

I upgraded my 60F three days ago. I using BGP, OSPF, many VPN tunnels, SSLVPN, many VLANS, seucirty policies (IPS, Webfiltering, WAF, App control). Everything looks ok, no issues for now. 

View solution in original post


We upgraded our FG200E last weekend.  So far, so good.  No problems noticed.  We do have a fairly simple configuration though.

I have been hanging out to get v6.0.10 because it has a Bugfix in it for the problem which was causing RDP sessions over a FortiClient SSL VPN connection to keep dropping out.

Can confirm that the bugfix indeed works.  No dropouts since upgrading.

View solution in original post

Valued Contributor II

No problems so far (only 4 days).  Memory use has stayed stable.  Some longer times on DNS resolutions, but that is almost always just due to Fortiguard, the actual DNS servers used, Chromium, etc.

View solution in original post


Upgraded a 200D yesterday from 6.0.9 to 6.0.10

Immediately saw cpu and memory usage is lower than on 6.0.9


There are quite a few fixes for SSL vpn issues, so will be interested to see if some of the problems we have seen on 6.0.9 are now fixed or at least improved.




Note to those upgrading from 5.6 to 6.0 range.


After upgrade you may find that the public IP address of the Fortigate is pingable from any source.

There is a change in 6.0 so that trusted hosts no longer controls this behaviour.


You will need to create a local-in policy to allow pings to only trusted hosts.


refer to the following KB document:



Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Top Kudoed Authors