Created on 07-18-2024 12:33 AM Edited on 11-28-2024 12:29 AM By Jean-Philippe_P
Description | This article describes why it is necessary to disable ASIC on firewall policy. |
Scope | FortiGate with ASIC. |
Solution |
The FortiGate integrated sniffer will not capture packets that are offloaded with the integrated ASIC, so NP6 or NP7, including the 'lite' versions (NP6lite, for example). Packets can be seen normally with a flow trace, but the sniffer will not show these.
If necessary, run a flow trace, that visualizes the policy evaluation of any given packet, in the following way:
diag debug console timestamp enable This will capture 20 packets, identifiable with the 'trace_id=<number>'.
Which would also capture 20 packets, however, only the ones that are not offloading. To change the behavior, disable the ASIC offloading in the firewall policy.
Command to disable ASIC in policy:
config firewall policy set auto-asic-offload disable
Note: Create a more specific firewall policy and then disable ASIC offloading just there, to prevent CPU overutilization. Remember to revert the changes once the troubleshooting is done.
Command to re-enable the ASIC in policy after testing:
config firewall policy edit <policy_id> set auto-asic-offload enable end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.