Description | This article describes how to avoid packet loss while updating/restarting the IPS engine. |
Scope | FortiOS 7.0.X, 7.2.X, 7.4.X and 7.6.X. |
Solution |
In some cases there might be long-living sessions on the firewall that need to be keep alive in case the IPS engine is being updated/restarted. Follow the example below, where a session with duration of '1882093' is getting restarted upon updating the IPS engine. This is expected behavior, because the session was offloaded to the IPS engine, but there is a way to apply certain configuration change to avoid that.
Before IPS engine restarts: session info: proto=6 proto_state=11 duration=1882093 expire=3599 timeout=3600 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
After IPS upgrade/downgrade or IPS engine restart:
session info: proto=6 proto_state=66 duration=129 expire=4 timeout=3600 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
Explanation:
When NTurbo is enabled, during IPS engine update, the old ips engine will be killed and a new IPS engine will start. During this period of time, since the NTUrbo offloaded session has been pushed to NPU, the traffic keeps coming but there is no reader (IPS engine here). So the traffic will be dropped automatically.
Configuration change:
config firewall policy
After finishing the upgrade/restart of the IPS engine, this change can be reverted to use the NP offloading function again. |