| Description |
This article describes how to identify which policy is being matched for the ongoing web browsing traffic using session output. In certain scenarios, tracking the correct policy ID for ongoing browsing sessions from forward traffic logs can be challenging. However, using the session output allows us to instantly and accurately identify which policy is being matched. |
| Scope | FortiGate. |
| Solution |
Open the CLI console of the firewall and use the obtained as a session filter for the destination IP: erbium-kvm21 # diagnose sys session filter dst 15.161.156.80 erbium-kvm21 # diagnose sys session list session info: proto=6 proto_state=01 duration=122 expire=3562 timeout=3600 refresh_dir=both flags=00000000 socktype=0 sockport=0 av_idx=0 use=3 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.