1. Fortinet FortiOS CLI Reference (7.2.1): The config system session-ttl command set includes the tcp-time-wait parameter. The documentation states: "Time in seconds that a TCP session is kept in the session table after the final ACK is seen (1 - 86400 sec
default = 1)." This directly confirms its role in post-closure session lifetime. (See config system session-ttl section).
2. Fortinet FortiOS Handbook - Firewall (7.2.1): In the "Session TTL" section
the handbook explains the various timers that FortiOS uses to manage session lifetimes. It describes how tcp-time-wait specifically manages the state after a graceful TCP close
which is the exact scenario described in the question.
3. Fortinet Knowledge Base Article ID: FD30039: This article
"Troubleshooting Tip: First packet dropped (denied) by firewall policy
" explains how session timers
including tcp-time-wait
affect packet handling. It clarifies that if a session is timed out
subsequent packets will be dropped. Increasing the relevant timer can resolve this.