Created on
04-28-2024
11:58 PM
Edited on
09-03-2025
11:23 PM
By
Anthony_E
| Description | This article describes that session/traffic will not be offloaded when having a DoS-policy in place. |
| Scope |
FortiGate. |
| Solution |
When using a DoS-policy on FortiGate, for example:
config firewall DoS-policy ...
The session will not offloaded due to:
diagnose sys session list
After removing the DoS-policy:
config firewall DoS-policy cen_601f_1 (DoS-policy) # purge
diagnose sys session list session info: proto=1 proto_state=00 duration=7 expire=53 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
This is the same behavior with UDP traffic. If there is too much UDP/ICMP traffic and it hits FortiGate's CPU, high CPU usage will occur. There is an option to offload DoS policy traffic to the Network Processor based on the matched pre-defined signature in the DoS policy and the FortiGate device by applying the following configuration. config system settings set policy-offload-level dos-offload end
Related document: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.