Created on
07-21-2025
12:00 AM
Edited on
07-22-2025
01:39 AM
By
Anthony_E
Description | This article discusses the error messages 'Find a candidate session' and 'tuple not match, drop'. |
Scope | FortiGate. |
Solution |
The traffic is initiated from the source IP 51.xx.xx.2 behind the FortiGate, which is configured with a public IP address, towards the destination 52.xx.xx.xx.
Debug flow:
2025-07-15 13:40:08 id=65308 trace_id=106 func=print_pkt_detail line=5873 msg="vd-root:0 received a packet(proto=17, 51.xx.xx.2:22614->52.xx.xx.xx:50214) tun_id=0.0.0.0 from LAN. "
Network Diagram:
Once the traffic is allowed, the FortiGate will create a session with the following tuple:
orgin->sink: org pre->post, reply pre->post dev=89->90/90->89 gwy=51.xx.xx.18/0.0.0.0
However, the destination 52.xx.xx.xx is sending traffic to the source 51.xx.xx.2, not the NATed IP address. As a result, the FortiGate drops the traffic because the session tuple does not match.
2025-07-15 13:40:08 id=65308 trace_id=112 func=print_pkt_detail line=5873 msg="vd-root:0 received a packet(proto=17, 52.xx.xx.xx:50214->51.xx.xx.2:22614) tun_id=0.0.0.0 from WAN. "
To resolve the issue, disable NAT on the FortiGate. In this case, Central NAT is being used, so create a Central NAT rule with NAT disabled and place it above the policy that is performing NAT.
config firewall central-snat-map edit x end
If NAT is being used in the policy (no Central NAT), then disable NAT in the policy to resolve the issue. Another way to resolve the issue is to force the destination not to send traffic directly to the source, although this may not be possible in some scenarios. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.