Created on
04-04-2024
11:54 PM
Edited on
03-24-2025
11:15 PM
By
Anthony_E
Description | This article describes the troubleshooting steps when 'Policy is not active' is showing on the FortiOS debug flow |
Scope | FortiGate. |
Solution |
Sample debug flow output when the issue is happening:
'Policy is not active' error logs are typically associated with Schedule misconfiguration under firewall policy.
By default, recurring profile 'always' is set to 'all days'(all days of the week) and all day(all time of the day).
After the change, the 'policy is not active' error no longer appears in the debug flow. It is possible to verify that the traffic matches policy 2 as expected.
If there is a set specific time of the day, make sure it matches the expected time for the policy to work based on the set time zone in the FortiGate setting.
For Policy-based NGFW mode: In policy-based NGFW mode, the schedule option is configurable under 'Security Policies' and if the schedule is misconfigured, flow debug shows the traffic is allowed by the policy which is the 'SSL Inspection & Authentication' policy because the 'SSL Inspection & Authentication' policies does not have schedule or action options; traffic matching the policy is always redirected to the IPS engine.
In this case, PME debug is required to the security policy match which is explained in this KB ARTICLE: Technical Tip: Basic command for investigating firewall policy based mode traffic
PME[353751/0] policy 438: static match not passed |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.