| Description | This article explains a reported issue with the schedules that are used in the Firewall Policy and steps to troubleshoot the issue, along with information about the fix. |
| Scope | FortiGate v7.2 and v7.4. |
| Solution |
Schedules in FortiGate are useful for the status of the policy based on the requirements. Once the FortiGate time exceeds the end time configured in the Schedule, the Firewall policy that uses that schedule must become inactive, and new sessions should not match the policy. For more information about the behaviour of the schedule, refer to this article: Technical Tip: How to apply a schedule to a firewall policy.
In some instances, the FortiGate does not honor the time and does not make the security policy inactive. This leads to matching the incorrect policy in the FortiGate. For example, below is a configuration for the Schedule in the FortiGate
config firewall schedule recurring
There are 2 Firewall policies configured in the FortiGate. One of the policies is using the above-mentioned schedule. As per this configuration, the Policy ID 1 must be active between 2:30 PM to 7:00 AM from Sunday to Thursday, and it should be inactive after 7:00 AM and match the Policy ID 2.
config firewall policy
The forward traffic logs in the FortiGate show that new sessions that are created after the scheduled end time still match the Policy ID 1, which is mentioned above.
Flow debug on the FortiGate shows that traffic is matching Policy ID 1, as it has not been made inactive.
FG421F-7 # 2026-01-14 07:23:48 id=65308 trace_id=99 func=print_pkt_detail line=5862 msg="vd-root:0 received a packet(proto=6, 10.110.18.185:1024->8.
This issue matches a reported issue in FortiOS versions 7.2 and 7.4, and the issue ID is 1002269. The issue is fixed in FortiOS versions 7.4.5, 7.6.0, and above.
One of the workarounds is to configure a dummy schedule in the FortiGate. This dummy schedule need not be added to any Firewall policy. The end time and start time for the dummy schedule should be configured based on the delays observed in matching the correct policy. For example, if the Firewall starts to match the policy with a schedule with a delay of 30 Minutes and stops matching it with a 30 Minute delay, then create a dummy schedule similar to the example below.
edit "Lab" end
edit "Lab_Dummy" end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.