Description | This article describes that the policy rule 'all source ip/service to all' has been created for the outbound traffic flow but the deny log is still recorded in the forward traffic log. |
Scope | FortiGate v7.0. |
Solution |
In the forward traffic log below, found the deny log caused by 'no session matched'.
The commands below could look into the session table records. Filter-related IP address and service port:
diagnose sys session filter src 10.165.10.229 <----- The related source IP address for the outbound traffic flow. diagnose sys session port 25 <----- The related service port number in the traffic flow.
In this case, there is no session has been established in the table:
diagnose sys session list
Capturing packet for further investigation packet flow details:
diagnose sniffer packet any 'host 10.165.10.229 and port 25' 4 0 l <----- Filter by the source IP address and service port
In the packet flow, the TCP three-way-hand-shaking first packet SYN has never been received but the RST/ACK packet yes. This means that in an asymmetric environment if the FortiGate does not receive an SYN packet, it will not establish a session and allow it even if the policy rule has been created. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.