Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Raudi wrote:Yesterday i had a issue with 6.4.1 too, after 24 days in my homeoffice my internet access was gone, so i logged in to the 100E and the device shows "conserve mode".
I made a litte research and all the memory was used by "480" tasks with the name "node".
Now after a reboot the memory usage is going slowly straight up, so i think in a few days i must reboot the device again. At the moment i have 186 of the "node" tasks, and every few minutes i can count one more...
Thanks for the report. We are working on a fix for this issue for 6.4.2.
I don't think there were any policies with SD-WAN members before the upgrade (is that even possible when they are members of an SD-WAN?). However, I would have used VIPs on individual members. Could that be the cause of the issue?
Sorry, I'm not in a position to share the config in this case.
We didn't have individual SD-WAN members in firewall policies as well. But you are right we used the members in VIPs as well and I remember after upgrade VIPs had a warning signs.
Magnitude 8 wrote:Yes, we do allow using individual SD WAN member in firewall policy in 6.4.0. However, that design is now converted to SD WAN zone in 6.4.1.I don't think there were any policies with SD-WAN members before the upgrade (is that even possible when they are members of an SD-WAN?). However, I would have used VIPs on individual members. Could that be the cause of the issue?
Sorry, I'm not in a position to share the config in this case.
Having an inactive VIP on your member interface should not trigger the zone separation. But if the VIP is being used in a policy, this means your policy must have used the member interface since the VIP depends on it, then the member interface will be put in a separate zone. Also worth noting that this is for all policy type, not just IPv4 Firewall. If you still think your SD WAN member should not be put in a separate Zone automatically, please report it to customer service so we can properly follow up on your case there.
Same happened with SD-WAN.
2 member interfaces belong virtual-wan-link and 1 member interface moved to upg-zone-wan1 after upgrade to 6.4.1
I moved 1 member interface from upg-zone-wan1 to virtual-wan-link and had to update all firewall polices (deleted upg-zone-wan1) and Interface Pair View is Ok now.
But still there are some more small issues:
- CLI from GUI doesnt work (lost connection).
- 'Firewall User Monitor' doesn't show 'User Group' for 'Radius Single Sign-on users' (RSSO works but just doesn't show name of 'User Group')
Decided to roll back to 6.2.4 and wait the next update.
We had one more issue with 6.4.1
All firewall policies with Flow-based Inspection mode had a warning signs, You can not use inspection mode with current settings. We didn't find the cause of that messages (probably there are new requirements for flow-based mode)
There are not messages in [strike]6.4.2. [/strike] 6.2.4
owla wrote:Do you mean 6.2.4? I don't see 6.4.2 released unless you are beta testing?We had one more issue with 6.4.1
All firewall policies with Flow-based Inspection mode had a warning signs, You can not use inspection mode with current settings. We didn't find the cause of that messages (probably there are new requirements for flow-based mode)
There are not messages in 6.4.2.
One other point of note, is I assume you upgraded from 6.2.4 to 6.4.0 and then 6.4.1? Going from 6.2.4 to 6.4.1 isn't supported if I recall. I just took at 500D from 5.6.4 to 6.4.1 (going to 6.4.0 first was part of the process) and it is running fine, but we are only using it as a one arm sniffer without any other policies so the config is very simple.
We followed the update path 6.2.4 -> 6.4.0 -> 6.4.1
Our config is complicated. Couple extra VDOMs, SD-WAN, VPN, VIPs, Explicit proxy, 100 firewall rules, deep inspection....
We would like to use new version 6.4.1 because there is new feature 'Upstream proxy authentication in transparent proxy mode'.
Ah. Yes I appreciate the complexity now. Good on you for having a good backup so you could revert. Far too few folks keep that option viable due to their processes. Last year we migrated from 500D to 501E. We used the script import section to import our rules and policies with updated interface names. It was a lot of work but got us to a stable config. You have to think through the logical dependancies for it to work. Configure interfaces, then addresses, then security policies, and finally firewall rules. It is tricky but it worked after some false starts.
One other suggestion is after each upgrade have the console online with a laptop via serial so you can watch the process. Use the diag debug config-error-log read to see what it indicates didn't convert properly or is a source or error. One other thing I've done in the past is keep a pre upgrade config and a post upgrade config and use a diff feature such as Notepadd++ or Sublime Editor to look for the differences. Can help pinpoint the problem.
Sorry, of course to 6.2.4 (roll back)
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1702 | |
1092 | |
752 | |
446 | |
229 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.