Created on
‎07-18-2024
12:33 AM
Edited on
‎01-12-2026
10:53 PM
By
Jean-Philippe_P
| Description | This article describes why it is necessary to disable ASIC in a firewall policy. |
| Scope | FortiGate devices with ASIC. |
| Solution |
The FortiGate integrated sniffer (Troubleshooting Tip: Using the FortiOS built-in packet sniffer for capturing packets) cannot capture packets that are offloaded to integrated ASICs (such as NP6 or NP7). While these packets are visible in a flow trace, they will not appear in a standard sniffer capture unless offloading is temporarily disabled.
Before disabling hardware acceleration, use a flow trace to visualize how the policy is evaluating packets.
diagnose debug console timestamp enable diagnose debug flow show function-name enable diagnose debug enable
Note:
2. Disable ASIC offloading. Before using the packet sniffer (diagnose sniffer packet), disable ASIC offloading for the specific firewall policy.
Command to disable offloading:
config firewall policy set auto-asic-offload disable
Note: To prevent CPU overutilization, create a dedicated firewall policy for this task and disable offloading for that policy only.
3. Run packet capture: Once offloading is disabled, run the sniffer command:
diagnose sniffer packet any 'host <IP>' 6 20 a
4. Re-enable ASIC offloading: Once troubleshooting is complete, revert the changes to restore hardware acceleration performance.
config firewall policy edit <policy_id> set auto-asic-offload enable end
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.