Created on
10-21-2024
12:27 AM
Edited on
11-24-2025
02:25 AM
By
Jean-Philippe_P
| Description | This article describes the issue where traffic does not match the newly created policy, although routes and policy are configured correctly. |
| Scope | FortiGate. |
| Solution |
Scenario:
From the forward traffic logs, traffic is still hitting the previously configured policy.
The following needs to be done:
Confirm the direction of the policy is as intended. In this example, it should be from port2 to IPsec.
Policy lookup tools show that the traffic would match the new policy, which means the policy order is correct.
diagnose sys session filter src <source ip> diagnose sys session filter dst <destination ip> diagnose sys session list
To check the policy using CLI, use the syntax of the policy lookup command as follows:
diagnose firewall iprope lookup <src ip> <src port> <dst ip> <dst port> <protocol> <Incoming_interface>
For such cases, it is necessary to clear the existing session:
diagnose sys session filter src <source ip> diagnose sys session filter dst <destination ip> diagnose sys session list --> This will list current active sessions that match the above filter. diagnose sys session clear --> This will only clear the session that matches the above filter.
After the session is clear, traffic should be able to match the newly created policy. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.