Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
martyyy
New Contributor III

Traffic being dropped by FortiGate when asic-offload is enabled.

Im currently on FortiOS 7.2.8. 

Traffics are being dropped by FortiGate when asic-offload is enabled. To work this out, we are currently set the asic-offload to disable but this is not a long term solution.

 

Is this a bug on 7.2.8? 

https://docs.fortinet.com/document/fortigate/7.2.8/fortios-release-notes/236526/known-issues

 

Does this issue will be resolved in what FortiOS? 7.4.x or 7.2.x ?

 

Appreciate your feedback.

 

TIA :) 

1 Solution
Toshi_Esumi

You can at least recreate the situation relatively easily if you temporarily disable "override" (if you have it enabled) and run a command "diag sys ha reset-uptime".
https://docs.fortinet.com/document/fortigate/6.0.0/handbook/666653/primary-unit-selection-with-overr...
You probably want to do it in a maintenance window.

Redundant interface is different from HA but maybe they have the same mechanism in NP6Xlite. But TAC can tell you if it's the same cause when you open a ticket and ask them to get it evaluated.

Toshi

View solution in original post

13 REPLIES 13
Toshi_Esumi
SuperUser
SuperUser

Are you looking at 860460? That involves "a redundant interface". Or 869978? Which involves CAPWAP.
In the end, you have to open a case at TAC to get your situation evaluated to match one of known issues if it's caused by a bug. Then, there maybe a workaround TAC can tell you to try. If no matching, you need to get a bug report created, which you can't do through this community/forum.

Toshi

mpapisetty
Staff
Staff

@martyyy ,

I would start with identifying the nature of impact. Is it affecting all traffic? Some type of traffic? Specific policy? Based on that we could narrow down what the issue is and work through a solution. 

-Manoj Papisetty
martyyy
New Contributor III

 It is happening on a redundant interface. This interface does not involve CAPWAP tunnel traffic.
The redundant interface is a Layer3 interface (no Layer2)
The firewall is in HA mode and it only happens when we failover to the redundant firewall.

Toshi_Esumi

So it's more an HA issue with NPU. What is your model/NPU type? NP7? It's not in the releasenotes under known issues/HA.

Toshi

martyyy
New Contributor III

Currenly the model is FG101F. Im seeing this bug ID which might be related.

860460 - On a redundant interface, traffic may drop with some NPU-offload enabled policies when the interface is not initialized properly.

It resolved in FortiOS 7.4.2. 
https://docs.fortinet.com/document/fortigate/7.4.2/fortios-release-notes/289806
The issue is not reproduceable since it only happens when we failover to the redundant firewall.
Does upgrading to 7.4.2 will resolve the issue? 
Thank you :) 

Toshi_Esumi

You can at least recreate the situation relatively easily if you temporarily disable "override" (if you have it enabled) and run a command "diag sys ha reset-uptime".
https://docs.fortinet.com/document/fortigate/6.0.0/handbook/666653/primary-unit-selection-with-overr...
You probably want to do it in a maintenance window.

Redundant interface is different from HA but maybe they have the same mechanism in NP6Xlite. But TAC can tell you if it's the same cause when you open a ticket and ask them to get it evaluated.

Toshi

mpapisetty

Hi @martyyy ,

It looks very likely that you are running into the bug that you mentioned here. It does affect the 101F and for redundant interface on the backup unit. 

-Manoj Papisetty
mle2802
Staff
Staff

Hi @martyyy,
Do you have HA pair? I would suggest to open a case with TAC for bug verification to better troubleshooting. 

martyyy
New Contributor III

The firewall is in HA mode and it only happens when we failover to the redundant firewall.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors