C is the correct answer.
This article explains that inspection is being done because proto_state=11
https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-FortiGate-session-table-information/ta-p/196988?externalID=FD30042
proto_state: state of the session (depending on protocol)
For TCP, the first number (from left to right) is related to the server-side state and is 0 when the session is not subject to any inspection (flow or proxy). If flow or proxy inspection is done, then the first digit will be different from 0.
The second digit is the client-side state. The table above correlates the second-digit value with the different TCP session states. For example, when FortiGate receives the SYN packet, the second digit is 2. It changes to 3 when the SYN/ACK packet is received. After the three-way handshake, the state value changes to 1.
This article explains that traffic is not offloaded to npu: https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-Is-a-session-offloaded-Hardware-acceleration/ta-p/193373
If traffic is not offloaded on any direction, it would appear as follows:
offload=0/0.
C is correct
In the output from the diagnose sys session list command on a FortiGate device, the offload=0/0 information under the npu info section signifies that the session in question is not being offloaded to a Network Processing Unit (NPU), but is instead being handled by the Central Processing Unit (CPU).
Here's a breakdown of what this information means:
offload=0/0:
The two numbers represent the offload state for both directions of traffic (usually inbound and outbound).
The first number represents one direction (e.g., inbound), and the second number represents the other direction (e.g., outbound).
A value of 0 indicates that offloading to the NPU is not occurring for that direction of traffic.
Indication of CPU-based Processing:
When you see offload=0/0, it's an indication that the security profile inspection for this particular session is being processed by the CPU, rather than being offloaded to an NPU.
Offloading to an NPU would typically be represented with non-zero values in this field.
B, By looking at the NAT and GTW IPs, it is clear that the traffic is coming and going far. So no inspection as an ISP will do with a packet coming from a customer and going elsewhere
B, By looking at the NAT and GTW IPs, it is clear that the traffic is coming and going far. So no inspection as an ISP will do with a packet coming from a customer and going elsewhere
Enterprise_Firewall_7.0_Study_Guide-Online.pdf p 91, 92
First digit of "proto_state" value at 1 and considering all counters are at 0 for HW acceleration means CPU usage
I think if it was the captive portal redirection, it would need the "auth" state.
as the redir state is there, it can't be "B".
redir + no NPU state and offload 0/0 means the CPU did the job, so C is good.
as there is a url_cat, it's not only doing IPS inspection.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Seph1
Highly Voted 1 year, 9 months agomikerss
Most Recent 11 months agoBlackDealth
1 year agoPoBratsky
1 year agoromartinedg
1 year, 2 months agocedigger
1 year, 3 months agostetter2006
1 year, 5 months agofottyfan
1 year, 5 months agocertifi46
1 year, 6 months agoducduc95
1 year, 7 months agoducduc95
1 year, 7 months agoQuetchup
1 year, 7 months agokashir
1 year, 7 months agodjela45
1 year, 9 months agoMrMaxe
1 year, 10 months agowisv2269
1 year, 10 months agotururu1496
1 year, 10 months ago