Description | This article describes an observed anomaly in FortiGate systems where the 'UDP session duration' recorded in Forward Traffic logs may appear inconsistent with the configured session timeout values. |
Scope |
FortiGate before v7.4.2. |
Solution |
Although UDP session duration is designed to follow the configured udp-idle-timer parameter, instances have been identified where the duration reported in Forward Traffic logs exceeds the defined threshold.
config system global
Forward Traffic logs have displayed session durations greater than 180 seconds. Further verification via the session table revealed that the expire value was negative, resulting in session durations surpassing the configured idle timer.
diagnose sys session list | grep duration
Root cause and resolution:
Recommended action: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.