Getting Started with Upgrade
The following table describes the approved upgrade path applicable for all controllers except the new virtual controllers.
NOTE:
FortiWLC-1000D and FortiWLC-3000D controllers can be upgraded only from 8.3 releases.
Supported Upgrade Releases
From FortiWLC release… |
To FortiWLC Release… |
7.0 |
7.0-10-0 |
8.0 |
8.0-5-0, 8.0-6-0 |
8.1 |
8.1-3-2 |
8.2 |
8.2.4 |
8.2.4/8.3 |
8.3.1 |
7.0.11, 8.2.7, 8.3.0, 8.3.1, and 8.3.2 |
8.3.3 |
7.0-11, 8.2.7, 8.3.0, 8.3.1, 8.3.2, 8.3.3 |
8.4.0 |
NOTE:
- Fortinet recommends that while upgrading 32-bit controllers to version 8.4.0, use the upgrade controller command instead of the upgrade system
- Controller upgrade performed via CLI interface will require a serial or SSH2 connection to connect to the controller and use its CLI. FortiWLC-1000D and FortiWLC-3000D controller upgrades can be performed via GUI as well.
Check Available Free Space
Total free space required is the size of the image + 50MB (approximately 230 MB). You can use the show file systems command to verify the current disk usage.
controller# show file systems
Filesystem 1K-blocks Used Available Use% Mounted on /dev/hdc2 428972 227844 178242 57% /
none 4880 56 4824 2% /dev/shm
The first partition in the above example, /hdc2, although the actual name will vary depending on the version of FortiWLC-SD installed on the controller is the one that must have ample free space.
In the example above, the partition shows 178242KB of free space (shown bolded above), which translates to approximately 178MB. If your system does not have at least 230MB (230000KB) free, use the delete flash:<flash> command to free up space by deleting older flash files until there is enough space to perform the upgrade (on some controllers, this may require deleting the flash file for the current running version).
Set up Serial Connection
Set the serial connection for the following options:
NOTE:
Only one terminal session is supported at a time. Making multiple serial connections causes signalling conflicts, resulting in damage or loss of data.
- Baud–115200
- Data–8 bits
- Parity–None
- Stop Bit—1
- Flow Control—None
Supported Hardware and Software
This table lists the supported hardware and software versions in this release of FortiWLC.
Hardware and
Software |
Supported |
Unsupported |
Access Points |
AP122
AP822e, AP822i (v1 &
v2) AP832e, AP832i,
OAP832e
AP332e*
AP332i*
AP433e*
AP433i*
OAP433e*
FAP-U421EV
FAP-U423EV
FAP-U321EV
FAP-U323EV
FAP-U422EV
|
FAP U221EV
FAP U223EV
FAP U24JEV
AP1010e*
AP1010i*
AP1020e*
AP1020i*
AP1014i*
AP110*
|
AP201
AP208
AP150
AP300, AP301,
AP302, AP302i,
AP301i
AP310, AP311, AP320,
AP310i, AP320i
OAP180
OAP380 |
*Cannot be configured as a relay AP |
Controllers |
FortiWLC-50D
FortiWLC -200D
FortiWLC -500D
FortiWLC- 1000D#
FortiWLC -3000D#
FWC- VM-50#
FWC –VM-200#
FWC –VM-500#
FWC –VM-1000#
FWC-VM-3000# |
MC3200, MC3200-VE
MC1550, MC1550-VE
MC6000
MC4200 (with or without 10G Module)
MC4200-VE |
MC 5000
MC 4100
MC 1500
MC 1500-VE
|
#Spectrum Manager NOT supported in these controller models. |
FortiWLM |
8.3.3/8.4 |
|
FortiConnect |
16.8.2 |
|
Browsers |
|
|
FortiWLC (SD) WebUI |
Internet Explorer 9,10
Mozilla Firefox 25+
Google Chrome
31+ |
|
|
NOTE: |
ation of Firefox 3.0 and 3.5+ prevents the display of the X-axis legend of dashboard
. |
A limit graphs |
Captive Portal |
Internet Explorer 6, 7, 8, 9, 10, IE11 and Edge.
Apple Safari
Google Chrome
Mozilla Firefox 4.x and earlier
Mobile devices (such as Apple iPhone and BlackBerry) |
|
|
|
|
|
|
|
Installing and Upgrading
Follow this procedure to upgrade FortiWLC-50D, FortiWLC-200D, FortiWLC-500D, MC1550, MC1550-VE, MC3200, MC3200-VE, MC4200, MC4200-VE and MC6000 controllers. See section Upgrading FortiWLC-1000D and FortiWLC-3000D to upgrade FortiWLC-1000D and FortiWLC-3000D. See Upgrading Virtual Controllers to upgrade virtual controllers.
- Download image files from the remote server to the controller using one of the following commands:
# copy ftp://ftpuser:<password@ext-ip-addr>/<image-name-rpm.tar><space>.
[OR]
# copy tftp://<ext-ip-addr>/<image-name-rpm.tar><space>.
Where
- image-name for legacy controllers: meru-{release-version}-{hardware-model}rpm.tar. Eg, meru-8.3-3-MC4200-rpm.tar
- image-name for FortiWLC: forti-{release-version}-{hardware-model}-rpm.tar. Eg, forti-8.3-3-FWC2HD-rpm.tar
- Disable AP auto upgrade and then upgrade the controller (in config mode)
# auto-ap-upgrade disable
# copy running-config startup-config
# upgrade controller <target version> (Example, upgrade controller 8.3)
The show flash command displays the version details.
- Upgrade the APs
# upgrade ap same all
After the APs are up, use the show controller and show ap command to ensure that the controller and APs are upgraded to the latest (upgraded) version. Ensure that the system configuration is available in the controller using the show running‐config command (if not, recover from the remote location). See the Backup Running Configuration step.
Upgrading FortiWLC-1000D and FortiWLC-3000D
To upgrade to FortiWLC-1000D and FortiWLC-3000D, use the following instructions.
In version 8.4.0, the image naming systems have been changed for 64 bit controller models from Primary/Secondary to image0/image1. This change applies to the upgrade procedure in the related FortiWLC GUI screens and CLI commands.
Upgrading via CLI
- Use the show imagesc ommand to view the available images in the controller. By default, a new controller will boot from the primary partition which contains the running image.
default(15)# show images
Running image: Primary <—- Denotes Primary Partition
——————————————————————————– Running image details.
System version: 0.3.2
System hash: 11af7a3f3a700d3c8335dc254165282a91bd021b
System branch: master
System built: 20170323191620
System memory: 721M/1006M
Apps version: 8.3-1build-15
Apps size: 1204M/1822M
——————————————————————————– Other image details.
System version: 0.3.3
System hash: 4699cb9f517c4a2abbbce458f689bf3558b5d65e
System branch: master
System built: 20170511180827
System memory: 729M/1015M
Apps version: 8.3-1build-21
Apps size: 1119M/1821M
- To install the latest release, download the release image using the upgrade-image command:
upgrade-image scp://<username>@<remote-server-ip>:<path-to-image>/<image- name>-rpm.tar both
reboot
The above command will upgrade the secondary partition and the controller will reboot to secondary partition.
NOTE:
After an upgrade the current partition will shift to the second partition. For example, if you started upgrade in primary partition, post upgrade the default partition becomes secondary partition and vice- versa.
default(15)# show images
Running image: Secondary ß— Current partition after upgrade
——————————————————————————-
Running image details.
System version: 0.3.2
System hash: 11af7a3f3a700d3c8335dc254165282a91bd021b
System branch: master
System built: 20170323191620
System memory: 729M/1015M
Apps version: 8.3-1build-20
Apps size: 1116M/1821M
——————————————————————————-
Other image details.
System version: 0.3.2
System hash: 11af7a3f3a700d3c8335dc254165282a91bd021b
System branch: master
System built: 20170323191620
System memory: 721M/1006M
Apps version: 8.3-1build-15
Apps size: 1204M/1822M
Upgrading via GUI
This section describes the upgrade procedure through the FortiWLC GUI.
NOTE:
- Standalone controllers running pre-8.3.3 FortiWLC (except version 0-12) are required to upgrade to 8.3.3 GA and then to the current 8.4.0 version.
Fortinet recommends upgrading via CLI to avoid this issue which occurs due to file size limitation.
- This issue does not exist on controllers with manufacturing build as 8.3.3 GA.
- To upgrade controllers using GUI, navigate to Maintenance > File Management > SD Version.
- Click Import button to choose the image file.
NOTE:
FortiWLC release 8.4.0 introduces software upgrades using the .fwlc format. This format will be supported in the forthcoming releases.
Direct upgrade from a pre-8.4.0 to 8.4.0 release using the .fwlc format is not supported.
- After the import is complete, a success message is displayed.
Switching Partitions
To switch partitions in FortiWLC-1000D, FortiWLC-3000D and the new virtual controllers, select the partition during the bootup process.
Upgrading 32-bit 8.3.3 Controllers (MC models, FortiWLC50D/200D/500D) with AP832/822 (without KRACK patch)
Upgrading from FortiWLC 8.3.3 to 8.4.0 results in runtime1 image corruption in AP832 and AP822v1. This is due to a resource leak in the 8.3.3 version which is fixed in later releases.
Follow these steps to upgrade from 8.3.3 to 8.4.0.
- Reboot the APs before upgrade.
- Run the upgrade controller command to upgrade controllers.
- Once the controller is online, upgrade the APs in batches. Before initiating upgrade, ensure all APs are rebooted so that the uptime is less than 5 hours.
NOTE:
Fortinet recommends that you upgrade the 8.3.3 32-bit controller before upgrading the access points due to the issue mentioned in this section.
If KRACK patch is installed on the 8.3.3 32-bit controller then this recommendation does not apply. The controller can be directly upgraded to 8.4.
Upgrading a N+1 Site
To upgrade a site running N+1, all controllers must be on the same FortiWLC-SD version and the backup controller must be in the same subnet as the primary controllers.
NOTE:
- 64-bit controllers running pre-8.3.3 FortiWLC (except version 0-12) are required to upgrade to the 8.3.3 GA version and then to the current 8.4.0 version.
- When upgraded to 8.3.3 GA, the N+1 setup needs to be reconfigured to enable N+1, that is, the master controller should be deleted and then added to the slave controller.
This reconfiguration is not required when upgrading from 8.3.3 GA to 8.4.0.
- This issue does not exist on controllers with manufacturing build as 8.3.3 GA.
You can choose any of the following options to upgrade:
- Option 1 – Just like you would upgrade any controller, you can upgrade a N+1 controller.
- Upgrade master and then upgrade slave.
- After the upgrade, enable master on slave using the nplus1 enable
- Option 2 – Upgrade slave and then upgrade master.
After the upgrade, enable master service on slave using the nplus1 enable command.
- Option 3 – If there are multiple master controllers
- Upgrade all master controllers followed by slave controllers. After the upgrade, enable all master controllers on slave controllers using the nplus1 enable
- To enable master controller on slave controller, use the nplus1 enable
- Connect to all controllers using SSH or a serial cable.
- Use the show nplus1 command to verify if the slave and master controllers are in the
The output should display the following information:
Admin: Enable
Switch: Yes
Reason: ‐
SW Version: 8.3-1
- If the configuration does not display the above settings, use the nplus1 enable <master‐controller‐ip> command to complete the configuration.
- To add any missing master controller to the cluster, use the nplus1 add master
Restore Saved Configuration
After upgrading, restore the saved configuration.
- Copy the backup configuration back to the controller:
# copy ftp://<user>:<passswd>@<offbox-ip-address>/runningconfig.txt origconfig.txt
- Copy the saved configuration file to the running configuration file:
# copy orig-config.txt running-config
- Save the running configuration to the start-up configuration:
# copy running-config startup-config
Upgrading Virtual Controllers
Virtual Controllers can be upgraded the same way as the hardware controllers. See sections Upgrading via CLI, Upgrading via GUI, and Upgrading a N+1 Site.
Download the appropriate Virtual Controller image from Fortinet Customer Support website. For more information on managing the virtual controllers, see the Virtual Wireless Controller Deployment Guide.
Upgrading the controller can be done in the following ways:
- Using the FTP, TFTP, SCP, and SFTP protocols.
- Navigate to Maintenance < File Management in the FortiWLC GUI to import the downloaded package.
The following are sample commands for upgrading the Virtual Controllers using any of these protocols.
- upgrade-image tftp://10.xx.xx.xx:forti-x.x-xbuild-x-x86_64-rpm.tar both reboot
- upgrade-image sftp://build@10.xx.xxx.xxx:/home/forti-x.x-xGAbuild-88-FWC1KDrpm.tar both reboot
- upgrade-image scp://build@10.xx.xxx.xxx:/home /forti-x.x-xGAbuild-88-FWC1KDrpm.tar both reboot
- upgrade-image ftp://anonymous@10.xx.xx.xx:forti-x.x-xbuild-x-x86_64-rpm.tar both reboot
The both option upgrades the Fortinet binaries (rpm) as well as the Kernel (iso), the apps option upgrades only the Fortinet binaries (rpm).
After upgrade, the Virtual Controller should maintain the System-id of the system, unless there were some changes in the fields that are used to generate the system-id. See the to the Licensing section for detailed information.
The International Virtual Controller can be installed, configured, licensed and upgraded the same way.
Upgrade Advisories
The following are upgrade advisories to consider before you begin upgrading your network.
NOTE:
Fortinet recommends upgrading a batch of maximum 100 APs.
Upgrading Virtual Controllers
In the upgrade command, select the options Apps or Both based on these requirements:
- Apps: This option will only upgrade the Fortinet binaries (rpm).
- Both: This option will upgrade Fortinet binaries as well as kernel (iso).
Upgrading FAP-U422EV
If the controller is running on pre-8.4.0 version and FAP-U422EV is deployed, follow these points:
OR
- It is advised not to plug in FAP-U422EV till the controller gets upgraded to 8.4.0.
Mesh Deployments
When attempting to upgrade a mesh deployment, you must start upgrading the mesh APs individually, starting with the outermost APs and working inwards towards the gateway APs before upgrading the controller.
Feature Groups in Mesh profile
If APs that are part of a mesh profile are to be added to feature group, all APs of that mesh profile should be added to the same feature group. The Override Group Settings option in the Wireless Interface section in the Configuration > Wireless > Radio page must be enabled on the gateway AP.
Voice Scale Recommendations
The following voice scale settings are recommended if your deployment requires more than 3 concurrent calls to be handled per AP. The voice scale settings are enabled for an operating channel (per radio). When enabled, all APs or SSIDs operating in that channel enhances voice call service. To enable:
- In the WebUI, go to Configuration > Devices > System Settings > Scale Settings
- Enter a channel number in the Voice Scale Channel List field and click OK.
NOTE:
Enable the voice scale settings only if the channel is meant for voice deployment. After enabling voice scale, the voice calls in that channel take priority over data traffic and this result in a noticeable reduction of throughput in data traffic.
New Features
This section describes the new hardware/software features introduced in this release of FortiWLC.
Fortinet Universal Access Points
The new Fortinet Universal Access Points (FAP-Us) are dual radio, dual band 802.11ac access points. These access points are designed to provide superior experience in data, voice, and video applications in enterprise class deployments.
FAP-U221EV and FAP-U223EV
The FAPs support two 2×2 MIMO radios (band locked) with a single core and comply with the IEEE 802.3af and 802.3at PoE specifications. A maximum of 8 ESS profiles and 128 clients are supported.
FAP-U24JEV
The FAPs support two 1×1 MIMO radios (band locked) with a single core and comply with the IEEE 802.3af and 802.3at PoE specifications. A maximum of 8 ESS profiles and 128 clients are supported.
The FAP has one 2×2 radio which will be always configured as two 1×1 interfaces.
NOTE:
FAP-U221EV, FAP-U223EV, and FAP-U24JEV do not support the following features:
- MU-MIMO
- LACP
- 0 – Not supported in version 8.4.0 only.
- Enterprise Mesh – Not supported on FAP-U24JEV only.
- Application Visibility (DPI)
FAP-U422EV
The FAP is a Wave-2 access point and supports two 4×4 MIMO radios (band locked) with a dual core. This device complies with the 802.3at PoE specifications. A maximum of 16 ESS profiles are supported.
The FAP supports all FortiWLC functionalities same as the FAP-U42xEV.
For more information on the FAPs, see the corresponding Quick Start Guides.
Enhancements
These are the enhancements in this release of FortiWLC.
- FAP-U422EV and AP832 are Passpoint R2 certified.
- In FortiWLC 8.4.0, the DFS is enabled for FAP-U32xEV FCC & Japan, FAP-U22xEV CE & Japan and FAP-U24JEV CE.
- The Simple Service Discovery Protocol (SSDP) is supported for Chromecast discovery. DNS configuration option is supported for FortiGate discovery.
Additional Information
This section describes information related to the usage of FortiWLC.
- Chromecast cast option is visible on the Youtube application only when the publisher or subscriber is in the tunneled mode.
- The capture-packets command with -R filer captures all packets instead of filtered packets.
Clients and Encryption Keys
These are the maximum supported clients and encryption/decryption keys for FAP models.
FAP Models
|
Maximum supported clients/radios |
Encryption/Decryption |
VCell |
Native Cell |
VCell |
Native Cell |
ARRP
(Off) |
ARRP
(On) |
Hardware |
Software |
Hardware |
Software |
FAP-U42x EV |
170 |
170 |
256 |
170 |
0 |
256 |
0 |
FAP-U32x EV |
170 |
170 |
256 |
170 |
0 |
256 |
0 |
FAP-U22x EV |
128 |
128 |
128 |
64 |
64 |
64 |
64 |
FAP-U24J EV |
128 |
128 |
128 |
64 |
64 |
64 |
64 |
VCell Roaming across Access Points
These are the supported VCell roaming details across APs.
Access
Points |
AP122 |
AP822 |
AP832 |
FAP-
U22xEV |
FAP-
U32xEV |
FAP-
U42xEV |
FAP-
U24JEV |
AP122 |
Supported |
Supported |
Supported with 2×2
MIMO mode |
Supported with 2×2
MIMO mode |
Supported with 2×2
MIMO mode |
Supported with 2×2
MIMO mode |
Supported with 1×1 mode |
AP822 |
Supported |
Supported |
Supported with 2×2
MIMO mode |
Supported |
Supported with 2×2
MIMO mode |
Supported with 2×2
MIMO mode |
Supported with 1×1 mode |
AP832 |
Supported with 2×2
MIMO mode |
Supported with 2×2
MIMO mode |
Supported |
Supported with 2×2
MIMO mode |
Supported |
Supported with 3×3
MIMO mode |
Supported with 1×1 mode |
FAP-
U22xEV |
Supported with 2×2
MIMO mode |
Supported |
Supported with 2×2
MIMO mode |
Supported |
Not
Supported |
Not
Supported |
Supported with 1×1 mode |
FAP-
U32xEV |
Supported with 2×2
MIMO mode |
Supported with 2×2
MIMO mode |
Supported |
Not
Supported |
Supported |
Supported with 3×3
MIMO mode |
Not
Supported |
FAP-
U42xEV |
Supported with 2×2
MIMO mode |
Supported with 2×2
MIMO mode |
Supported with 3×3
MIMO mode |
Not
Supported |
Supported with 3×3
MIMO mode |
Supported |
Not
Supported |
FAP-
U24JEV |
Supported with 1×1
MIMO mode |
Supported with 1×1
MIMO mode |
Supported with 1×1
MIMO mode |
Supported with 1×1
MIMO mode |
Not
Supported |
Not
Supported |
Supported |
Fixed Issues
These are the fixed issues in this release of FortiWLC.
Bug ID |
Description |
453607 |
SNMP results were incomplete for neighboring APs count. |
462374 |
In tunnel mode, STA did not communicate with the wired network after controller fail over. |
464122 |
No framed IP attribute in the accounting start packet. |
464687 |
wncagent spikes while running the event view, GUI and CLI failed to expose the event history. |
470393 |
STA did not receive packets from the wired network after controller fail over. |
473365 |
OAP433 crashes with kernel panic. |
448391 |
The Search/Filter option not available for port profiles in the feature group configuration page of the FortiWLC GUI. |
446850 |
The conn ap command co nnected to a different AP. |
449185 |
AP CommNodeId duplicated in multiple APs. |
452055 |
AP reboots with false ** FATAL ** Dead lock detected error. |
450379 |
Channel mismatch on some radios, with primary channel displayed as 44 and operating channel as 40. |
457195 |
sys commands failed in the AP CLI. |
455522 |
With Service Control enabled, the services crashed and restarted. |
454144 |
Wncagent crashes after every one hour. |
446296 |
AP sent Deauth to station by incorrect station type and unknown BSSID. |
443669 |
An incorrect number of stations displayed in the pie charts on the system dashboard. |
456464 |
Device connected but unable to pass traffic. |
449409 |
Nplus1 was disabled when firmware was upgraded on FortiWLC-1000D, |
452204 |
Random AP reboots with exception in APP visibility. |
452650,
452649 |
FAP-U421EV did not auto-negotiate 1Gbps full duplex. |
453317,
453316 |
Random AP832 crashes (NIP [c000d50c] e500_idle+0x90/0x94). |
453511 |
Unable to configure DNS and domain name during the initial setup when the controller was on default setting. |
457172 |
Controller based Captive Portal not working in the Bridged mode for AP822i. |
457183 |
With IE9, incorrect page displayed for the Security Profiles Configuration. |
460169 |
Channel mismatch on some radios, with primary channel displayed as 36 (Non- DFS channel) and operating channel as 100 (DFS Channel). |
460587 |
Unable to edit ESS profiles from the web GUI. |
461127 |
APs lost IP configuration after reboot and came up with default configuration. |
446772 |
CP bypass page displayed even though the client is MAC authenticated and bypass enabled. |
381008 |
Coordinator restarted due to memory issues |
435490 |
All Chromecast devices did not show up in Youtube for casting. |
423993 |
FAP-U421EV access points lost beacons in a virtual cell, causing clients to do assoc-2-assoc. |
409488 |
Error in copying from backup configuration to running configuration. |
422065 |
Controller not sending the RADIUS accounting packet. |
462414 |
When the secondary DNS Server was configured, the secondary NetBIOS server gets the same IP address as the secondary DNS server. |
448985 |
When controller fails over, OUI configuration of client_locater is not taken over to the new active controller. |
449154 |
When the client_locator is enabled and the controller fails over, client_locator is disabled on the new active controller. |
470643 |
Nplus1 configuration fails after firmware upgrade from 8.3 on FortiWLC1000D. |
470641 |
IP address on the slave controller is missing after firmware upgrade from 8.3 on FortiWLC-1000D. |
466824 |
FAP-U321 upgrade fails. |
469118 |
wncagent spikes observed. |
470822 |
FAP-U421 reboots while unable to handle kernel null pointer – LR is at wlc_scbfindband+0x5c/0x130 [wl]. |
437223 |
The Console page in Chrome indicates that Adobe Flash is not installed even when it is installed in the Spectrum manager. |
438782 |
Spectrum analysis: Overlay interference is misinterpreted as interference detected by the FAP. |
436573 |
When upgrading from any prior release to 8.3.3, in N+1 configuration the passive slave controller Switch and Reason are No and No Config respectively.
This issue occurs on 64-bit Controller models/instances. |
470640 |
Radio Tx Freeze on FAP-U421EV & FAP-U423EV. |
351641 |
[OAP-832] Frequent leaf node reboots with the LOST CONTACT with controller error. |
475059 |
The controller IP address is set to 0.0.0.0 in the VPN administration page post upgrade to 8.4.0. |
475307 |
[FAP-U42x] Radios’ operating channel is different than the configured channel. |
439721 |
High Latency and ping loss observed on clients configured in bridged mode with native and Static VLAN. |
Known Issues
These are the known issues in this release of FortiWLC.
Bug ID |
Description |
Impact |
Workaround |
450682 |
Random FAP-U421EV crashes with kernel panic. |
FAP reboots which impacts the client connectivity for the duration of AP boot up time. |
|
455780 |
In some MAC client devices authentication fails and the client is not able to connect.
This is due to the delay in processing EAPTLS messages. |
This issue is specifically seen in MAC clients, due to the delay in EAP-TLS messages being processed by the AP, in some cases authentication fails because of which clients are not able to connect. |
Set the authenticatio n timeout to 3 seconds. For more information, contact the Customer Support. |
461937 |
Sometimes, the FAP-U42x does not tag some packets on bridged data plane. |
Data loss on wireless devices. |
Connect the AP and run
sys perf off. |
420129 |
Fujistu smart phones with AP822 rev2 randomly drop calls and then reconnect to the network. This is due to wrong beacon information. |
Glitches during voice calls. |
Install the 8.2.7 special
build. For more information, contact the Customer Support. |
463646 |
Sometimes in the FAP-U units, in high multicast/broadcast traffic, performance issues and high latency are observed in the bridged mode. |
Latency in application usage for wireless clients. |
Disable
Multicast-to-
Unicast Conversion option. |
442046 |
[AP832] Sometimes, the APs do not respond to port 5000, client connectivity affected. |
The AP reboots when this condition is encountered. |
In 8.4.0, the AP auto reboots when this condition
is encountered.
For root |
|
|
|
cause fix, contact the Customer Support for installing the relevant patch. |
474057 |
[Virtual FortiWLC] In case of a fresh FortiWLC installation, the gateway does not recognize the services in the FortiWLC GUI.
In Monitor > Service Control > Service Details, the Service column is blank. |
The Services pie chart in the Service Control Dashboard is not visible, unless the setup command is run or the controller is rebooted. |
Run the setup command
and reboot the controller. |
474593 |
AP description with sh string gets lost post upgrade. |
The AP description is set to default (AP ID). |
Avoid using
sh string in AP description. |
453518 |
Difference in the AP signal strength on the 5Ghz band while operating in the normal mode and in the site survey mode (country code set to UK). |
While doing site survey there will be a difference in signal strength if there is change in TX power other than values of 3 and 4.
|
Contact the
Customer Support for installing the relevant patch. |
466751 |
Sometimes, the APs reboot in a loop when trying to add new APs or doing a bulk reboot. |
APs cannot discover the controller. |
|
462324 |
Sometimes, RADIUS requests are sent with the same port number for different IDs. |
TLS errors for the clients see at RADIUS end. No impact on connectivity. |
|
463626 |
Round trip delays are observed randomly
at wired side of AP822i after AP reboots. |
Latency on wireless clients. |
In 8.4.0, reboot the AP.
For root cause fix, contact the Customer Support for installing the relevant |
|
|
|
patch. |
463851,
448621 |
[FortiWLC-3000D/1000D] Sometimes in multiple upgrade scenarios spanning over releases, unable to add the master controller in slave controller in an N+1 setup. |
|
Contact the Customer Support. |
456513 |
Sometimes, AP832 connected to Cisco WS-C2960X-48FPD-L comes up as 802.3af and not 802.3at with the BLE dongle. |
BLE is disabled. |
Contact the
Customer Support for installing the relevant patch. |
464308 |
APs Stuck in Disabled/Online state after reboot.
This issue is observed under scale deployments, for example, rebooting 100+ APs at the same time. |
Client connectivity affected till the AP reboots. |
Reboot the AP. |
464541 |
Wired Port profile in Mesh uplink port gets lost after upgrade to FortiWLC 8.4.0. |
Wired clients cannot access the network. |
Recreate the port interface for the AP. |
Known Issues in FAP-U422/FAP-U24J/FAP-U22xEV
Bug ID |
Description |
Impact |
Workaround |
451168 |
FAP-U24JEV/FAP-U22xEV- DTIM functionality is not working.
PS-Poll based power-save clients fail to receive multicast traffic when the Multicast-to-Unicast Conversion option is disabled in the ESS profile. |
Power-save clients fail to receive the multicast traffic sometimes and the battery life of wireless device is drained. |
Enable the Multicastto-Unicast Conversion option [Default setting]. |
453903 |
FAP-U24JEV – Client mitigation fails when the Rogue AP detection feature enabled. |
Mitigation fails in cases of Rogue AP operating in foreign channel. |
|
474882 |
[FAP-U22x] Phy tx error with fatal error reinitializing and psm watchdog observed randomly on Radio 0/1 interface. |
Data loss is observed when the error is reported till it recovers. |
|
Common Vulnerabilities and Exposures
This release of FortiWLC is no longer vulnerable to the following:
Bug ID |
Vulnerability |
450012 |
• CVE-2017-1000251
• CVE-2017-1000250 |
454662 |
• CVE-2017-13077 to CVE-2017-13082
• CVE-2017-13084
• CVE-2017-13086 to CVE-2017-13088 |
461748 |
CVE–2016–8491 |
443753 |
Broadcom ESDK vulnerability fix. |
Visit https://fortiguard.com/psirt for more information.