Created on
01-06-2026
10:01 AM
Edited on
01-08-2026
02:26 AM
By
Jean-Philippe_P
| Description | This article describes why Cisco SCCP phones repeatedly reboot every 8-10 minutes when a FortiGate times out the TCP session on port 2000, causing subsequent keep-alive packets to be dropped. |
| Scope | FortiGate. |
| Solution |
Consider the following network topology: Cisco Phones -- FortiSwitch -- FortiGate -- IPsec -- FortiGate2 -- Call Manager.
Initially, the phones register successfully, and calls can be placed without any issues. However, after approximately 8-10 minutes, the phones reboot.
On the FortiGate, the forward traffic logs display Client Reset messages.
date=2025-12-30 time=15:38:15 itime="2025-12-30 15:29:43" type="traffic" subtype="forward" level="notice" action="client-rst" policyid=9 sessionid=35919 srcip=172.19.167.5 dstip=172.19.80.10 srcport=35908 dstport=2000 duration=6 proto=6 sentbyte=4568 rcvdbyte=4768 sentpkt=49 rcvdpkt=36 logid=0000000013 service="SCCP" app="SCCP" appcat="unscanned" srcintfrole="lan" dstintfrole="undefined" srchwvendor="Cisco" srchwversion="CP-6921" srcfamily="IP Phone" devtype="Home & Office" srccountry="Reserved" dstcountry="Reserved" srcintf="F1_Voice" dstintf="F1 to VPN" vpntype="ipsecvpn" policyname="LAN-VPN" tz="-0600" dstcity="Reserved" srccity="Reserved" srcgeoid=1000000000 dstgeoid=1000000000 vd="root" devname="FW-1".
The debug output shows the following behavior:
FW-1 # 2025-12-30 16:10:17 id=65308 trace_id=5 func=print_pkt_detail line=5824 msg="vd-root:0 received a packet(proto=6, 172.19.167.5:35926->172.19.80.10:2000) tun_id=0.0.0.0 from FIRE3_Voice. flag [.], seq 3291603173, ack 4070577917, win 16632"
The message 'no session matched' indicates that the traffic doesn't correspond to any existing session on FortiGate. This is due to the fact that the time-to-live value is set to 300 seconds, causing the session to expire.
config system session-ttl
SCCP Session list:
FW-1 # diagnose system session filter dport 2000 FW-1 # diagnose system session list
session info: proto=6 proto_state=01 duration=189 expire=110 timeout=300 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
The SCCP keep-alive packets arrive after the session timeout, causing the phones to reboot.
FW-1 # diagnose system session filter dport 2000 FW-1 # diagnose system session list
To resolve the issue, increase the session-ttl to the default value of 3600 seconds, or configure a custom timeout for TCP port 2000 that is longer than the phones' keepalive interval.
config system session-ttl
Or:
config system session-ttl set protocol 6
The behavior is not specific to the SCCP protocol; it can occur with any application or protocol that uses relatively long keepalive intervals, which may cause sessions to be timed out on FortiGate.
Related articles: Technical Tip: Enabling logging of 'no session matched' in FortiGate traffic log Troubleshooting Tip: How to troubleshoot the 'No Session Matched' error |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.