Unless you can reproduce the event and take a copy of a sniffing session it' s wild speculation as to what was going on. But I' ll try anyway.
When a TCP connection is established, the host sends a SYN packet, the server answers with SYN,ACK and the host answers with ACK again (3 way handshake). There has been an exploit circulating where the server answered with ACK only, thereby exchanging the roles of server and client, called TCP split-handshake exploit.
FortiOS was partially vulnerable against this but has been fixed. Search for the discussions on the forum to find more info.
Links:
http://watchguardsecuritycenter.com/2011/04/15/what-is-the-tcp-split-handshake-attack-and-does-it-affect-me/
(including a recipe how to set up a Ruby script doing this)
http://nmap.org/misc/split-handshake.pdf
As I wrote earlier, this is wild speculation. Only a packet sniff can reveal what is going on.
Ede Kernel panic: Aiee, killing interrupt handler!