| Description |
This article describes how the deny Policy is observed in the forward log, even though:
config vdom edit <vdom_name>
config system settings |
| Scope | FortiGate. |
| Solution |
Note that this is not a bug. The set tcp-session-without-syn has to be enabled on the firewall policy level as well. Upon enabling tcp-session-without-syn on the firewall policy. Subsequently, the packets are permitted.
Enter the following command in the CLI:
config firewall policy
Verify that packets are allowed by the relevant firewall policy in the forward traffic log.
Related article: Technical Tip: Use case of TCP-session-without-syn in firewall policies |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.