FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
btey
Staff
Staff
Article Id 383536
Description

This article describes the system warning when changing session-TTL for the Hyperscale firewall. The following warning appears when configuring the session-ttl:

 

config system session-ttl
    config port
       edit 53
          set protocol 17
          set timeout 30
          set start-port 53
          set end-port 53
       next
    end
end

"Warning: TTL(xx) sent to NPU is limited to 120 seconds, software TTL is unchanged."

Scope FortiGate, Hyperscale VDOM.
Solution

The minimum TTL for UDP traffic is set at 120 seconds for Hyperscale VDOM. Session setup by software will follow the configuration but session setup by hardware will remain as 120 seconds.

 

In v7.6.1 or later, this restriction has been removed and allowed to set any smaller value (Greater than or equal to 1) for UDP traffic.

 

Related documents:

Technical Tip: Session timeout settings

New features or enhancements

Contributors