Created on
‎12-08-2024
12:05 AM
Edited on
‎07-09-2025
09:55 PM
By
Jean-Philippe_P
Description | This article describes an issue where the FortiGate will drop traffic with the error 'Anti-Replay Check Fails, Drop' when a firewall policy is modified. Note that this issue (tracked by Issue ID #1015616) specifically affects NP7/NP7lite-based FortiGate models, such as the FortiGate-3501F and the FortiGate-90G. |
Scope | FortiGate v7.0.15, v7.2.9, v7.2.10, v7.4.3, v7.4.4. |
Solution |
When a firewall policy is modified, all the existing sessions are dropped by FortiGate with the error 'Anti-Replay Check Fails, Drop' in the debug flow output, and existing sessions are flagged as 'dirty'. Working scenario debugs:
Debug Flow output: id=65308 trace_id=1629 func=print_pkt_detail line=5862 msg="vd-root:0 received a packet(proto=6, 172.16.192.130:1521->172.16.192.69:51286) tun_id=0.0.0.0 from 630_database. flag [.], seq 383407350, ack 579585442, win 505"
Session List output: session info: proto=6 proto_state=01 duration=17 expire=3596 timeout=3600 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3 Non-working scenario debugs:
Debug Flow output: id=65308 trace_id=1895 func=print_pkt_detail line=5862 msg="vd-root:0 received a packet(proto=6, 172.16.192.69:51286->172.16.192.130:1521) tun_id=0.0.0.0 from 601-psoft-app. flag [.], seq 580634445, ack 385974823, win 6146" Session List output: session info: proto=6 proto_state=01 duration=124 expire=3589 timeout=3600 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
Resolution: Issue #1015616 has been resolved as of the following FortiOS versions:
Workaround:
config system global set anti-replay disable end
Or:
config firewall policy edit <id> set anti-replay disable next end
When the global anti-replay option is disabled, the FortiGate does not check TCP flags in packets.
Logs required by FortiGate TAC for further investigation:
execute tac report
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.