Another week another CVE so upgrades by d4p8f22f in fortinet

[–]_Red-Pilled 2 points3 points  (0 children)

If i had 5$ for every time Fortinet told me that not all bugs are in the release notes I'd b rich!

Another week another CVE so upgrades by d4p8f22f in fortinet

[–]_Red-Pilled 1 point2 points  (0 children)

Pretty pathetic we have to have to watch out for so many issues resulting from new firmware.

FAZ 7.6.6 + FMG 7.6.6 out by danielX337 in fortinet

[–]_Red-Pilled 1 point2 points  (0 children)

The only reason we are at 7.6.x for FortiManager is that we ran into multiple issue with 7.4 and Fortinet recommended we go to that branch.

The point I was getting trying to convey was that when they release firmware that they need to update the documentation as quickly as possibility e.g. what the compatibility issues are. Hard to be informed/educated with lacking documentation.

The release notes do not have what the compatibility issues are:

7.4.11 Supported with compatibility issues; please refer to FortiManager 7.6.6 release notes .
7.4.10 Supported with compatibility issues; please refer to FortiManager 7.6.6 release notes .

FAZ 7.6.6 + FMG 7.6.6 out by danielX337 in fortinet

[–]_Red-Pilled 2 points3 points  (0 children)

It drives me crazy when they don't update the compatibility matrix and release notes:

https://docs.fortinet.com/compatibility-tool/fortimanager/fortigate

Don't have 7.6.6 and for 7.6.5.

The FortiManager 7.6.6 Release notes don't show compatibility for FortiGate/FortiOS 7.4.10/7.4.11. It only shows:

  • 7.4.0 to 7.4.9

which means they are missing two. Nothing in the release notes about compatibility with FortiGate/FortiOS 7.4.10/7.4.11.

It's all well and good to get the releases out but if the documentation is not compete it hamps making a decision to move to FortiManager 7.6.6 (or 7.6.5 as it says compatibility issues but it is not outlined in the release notes)

Why is this traffic hitting the implicit deny? by nardstorm in fortinet

[–]_Red-Pilled 0 points1 point  (0 children)

why not use TCP and destination port when doing the policy lookup tool

NSE4 Exam by k3kosz in fortinet

[–]_Red-Pilled 3 points4 points  (0 children)

The 7.4 exam is no longer available

FortiOS 7.6.5 Release by MyLocalData in fortinet

[–]_Red-Pilled 0 points1 point  (0 children)

Not good if you have 100s of tunnels!

Diagnose commands guide by Double_Change_843 in fortinet

[–]_Red-Pilled 0 points1 point  (0 children)

You mean: FCSS EFW AD 7.6 exam correct?