| Description |
This article describes how to troubleshoot an issue after updating the application control signature, connection issues occurred. The connection was only restored after removing the application control profile on the hairpin traffic flow policy rule. |
| Scope | FortiGate v7.2.8. |
| Solution |
Verifying the true cause:
Topology: Traffic in vlan10>>>501_WAN1>>>> hairpin routed in vlan10 reuses the existing policy 588.
No configuration change, the hairpin traffic (client PC connects the VIP external IP then forwards the traffic to the same interface) will be dropped once policy ID 588 has been added to an application control profile (monitor all).
Run the traffic flow debug below to identify the issue if related to the bug ID: 1058494. When snat-hairpin traffic is enabled, SNAT is not automatically applied to hairpin traffic, causing an SNAT mismatch in strict-dirty-session-check: Resolved issues
Debug output:
id=65308 trace_id=2138 func=iprope_reverse_dnat_check line=1284 msg="in-[vlan501_WAN1], out-[vlan10_LAN], skb_flags-020000c0, vid-28" id=65308 trace_id=2138 func=fw_snat_check line=673 msg="NAT disabled by central SNAT policy!"
config system global set strict-dirty-session-check disable >>>>> workaround end
Action plan: If the debug log matches and the workaround setting takes effect for the traffic flow, it would match the bug id. The firmware needs to be upgraded to v7.4.5 to fix the issue. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.