FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Article Id 195633



The purpose of this note is to provide advice and configuration steps to save unit CPU and memory resources.



It is recommended to use the latest patch release available for the release version.



  1. Session timer optimizations:

    Each traffic flow passing through the FortiGate is associated to a firewall session created and maintained on the unit.  The less sessions the FortiGate manages, the less CPU resource is used to maintain them.  There are different possibilities to reduce the number of concurrent sessions :
  •  When a traffic flow stops, the associated session would remain in the FortiGate until a timer expires.
    This is true for TCP and UDP sessions (different timers are involved)
    => reducing the timer would help to get rid of the session earlier
  • TCP stuck sessions in half-opened, half-closed or even established state can also be released earlier.
  • Some protocols such as DNS are more likely to create a lot of sessions because they are based on short transactions
    => in this case, it is recommended to change the timer for this protocol to a suitable but short value.


  • 'Global' timers configuration:


config global                    [ if vdoms are used ]

config system global
    set tcp-halfclose-timer 30   [ default 120 s ]
    set tcp-halfopen-timer 30    [ default 60 s ]
    set tcp-timewait-timer 0     [ default 120 s ]   (*1)
    set udp-idle-timer 60        [ default 120 s ]

end                              [ if vdoms are used ]                            


(*1): A delay of 10 seconds is added on top of the value configured in 'tcp-timewait-timer', therefore a configuration of '0 second', would keep the session for 10 seconds after it is fully close. This is sufficient.


  • 'Per vdom' timers configuration:

The following timers are vdom based so this configuration should be repeated for each vdom.

config vdom  [ if vdoms are used ]

(vdom) # edit <vdom_name>
(<vdom_name>) # config system session-ttl

(session-ttl) # set default 300                 [ default 3600 ]                                                 
(session-ttl) # config port
(port) # edit 0               (*2)
(1) # set protocol 17
(1) # set timeout 10                           
(1) # set end-port 53
(1) # set start-port 53
# end

(session-ttl) # end

# end             [ if vdoms are used ]

(*2): 'edit 0' would pickup the next available index in the table for more convenience. In this example, entry 1 is created.

 Note: If needed, other protocols specific timers could be added. It is better to shorten the default timer and increase the timer for specific traffic on a protocol/port based. For instance, you may want your oracle or citrix  or telnet or ssh sessions to last longer if no activity is seen

2. Remove dns-udp firewall session helper if not used.

If a significant amount of DNS transactions pass through the FortiGate and FortiGate Virtual IP address DNS translation or DNS server is not used, the dns-udp session helper should be removed to limit kernel resource processing for each DNS traffic.

To do this from CLI:

config global   [ optionally if using vdoms ]

# config system session-helper:

- type 'show' to list all session helper defined and identify the 'edit' reference for the helper named 'dns-udp' :

    edit 14
        set name dns-udp
        set port 53
        set protocol 17

=> This is 14 in the following example

- delete the dns-udp helper providing its 'edit' reference :

(session-helper) # delete 14
(session-helper) # end


3. Disable not-required or 'nice to have' features:

Each feature that is enabled has its cost on the resources.  Disabling ‘nice to have’ features could make a difference.
Example of features :
- traffic logging (especially if the logging rate is high)
- ha session synchronization (for instance web browsing sessions do not have a requirement to be synchronized on the slave)
- Log and Archive Statistic table in GUI Dashboard : To be updated, this table requires 'content-summary' feature enabled which pushes sessions in the proxies creating extra load.

4. Use hardware acceleration whenever possible:

Hardware acceleration takes computing cycles off the FortiGate CPU, it should be used as much as possible.
For example, changing the ports used to maximize accelerated traffic makes a significant difference.
It is important to choose the ports used for traffic in a way that maximizes the ratio of hardware accelerated sessions.

Hardware acceleration can be done to offload traffic processing on interfaces but also IPSec encryption/decryption, 802.3ad link aggregation, SSL offload.

Refer to "Hardware acceleration Technical Note" at for more details.

5. Avoid use of GUI widgets requiring computing cycles:

Particularly on low end units, some GUI widgets (Dashboard page) involving computing cycles could be removed.
The best example is the "Top sessions" widget which requires the inspection on a regular basis of the full session table, especially if the session table is large.



CPU, memory and session resources can monitored through SNMP or CLI commands.

For SNMP, please refer to the proprietary MIB file for the version of code being used, this is available at in the Download Firmware section.  Load first generic mib file 'FORTINET-CORE-MIB.mib' and 'FORTINET-FORTIGATE-MIB.mib' specic MIB for the release.

Samples of useful MIB entries

. : Number of active sessions
. : Overall memory usage
. : Overall CPU usage


From the new structure using MIBS : FORTINET-CORE-MIB.mib + FORTINET-FORTIGATE-MIB.mib

* Monitor each CPU load individually:

.<processeur_id> with <processor_id> =1,2,3 or 4

Mib description : "The processor's CPU usage (percentage), which is an average calculated over the last minute."


For CLI, use a command such as:

* diagnose system session stat
* get system performance status
* diagnose system top
* diagnose hardware sysinfo memory


6. Schedule update such as Antivirus, IPS, and firmware updates during off-peak hours.


7. Prefer logging on dedicated platforms such as Fortianalyzer, Forticloud or syslog servers. Avoid using memory or disk logging.


8. Decrease the packet logging on policy or in sniffer.