Description |
This article outlines an issue where stopping the NPU Sniffer on NP7-based FortiGate devices may cause a traffic outage, requiring a reboot to restore normal functionality. |
Scope | FortiGate v7.0.12, v7.0.13, v7.0.14, v7.2.5 |
Solution |
On FortiGates equipped with an NP7 Chip, stopping the NPU sniffers using the command 'diagnose npu sniffer stop' may cause a traffic outage and result in the loss of access to both the FortiGate GUI and CLI. To check if the FortiGate is affected by this issue, run the following commands over a serial console connection and verify whether all output values are zero. FortiGate # diagnose npu np7 getreg 0 l2p.b_quad.b_quad_0.usr_arb_msk0 FortiGate # diagnose npu np7 getreg 0 l2p.b_quad.b_quad_0.usr_arb_msk1 FortiGate # diagnose npu np7 getreg 0 l2p.b_quad.b_quad_1.usr_arb_msk0 FortiGate # diagnose npu np7 getreg 0 l2p.b_quad.b_quad_1.usr_arb_msk1 This issue has been resolved in FortiOS v7.0.16, v7.2.8, v7.4.4. Workaround:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.