Description | This article explores the limitations and connectivity challenges when using a Loopback interface on FortiGates for FortiManager access. |
Scope | FortiGate, FortiManager. |
Solution |
In certain scenarios, there may be requirements to enable FortiManager access through a Loopback interface on FortiGate.
Scenario 1: A private Loopback IP address, which will require NAT to successfully establish connectivity to FortiManager. Configuration:
Solution: FortiGate generates self-initiated traffic to connect to FortiManager, which is routed and sent out through a standard network interface. Source NAT cannot be applied to self-generated traffic, even if a firewall policy is configured, since firewall policies do not apply to self-generated traffic. Connectivity to FortiManager is expected to fail.
Sample logs:
Scenario 2: A VIP/DNAT rule for port 541 pointing to the Loopback IP is configured on the interface through which FortiManager is reachable. 'fmg-source-ip" is set to 10.10.10.10 under "central-management' configuration.
config firewall vip
config firewall policy
Solution: In this scenario, FortiGate will still attempt to source the traffic using IP 10.10.10.10, and the connection to FortiManager will fail because NAT must be performed on the egress interface. If the discovery is initiated from FortiManager to FortiGate's VIP, the standard device discovery might fail with the message 'Probe Failed' as long as FortiGate cannot reach FortiManager from the IP address 10.10.10.10.
Important: FortiGate must be able to initiate its connection to FortiManager for a successful and stable connection.
Related document: FortiGate/FortiManager Communications Protocol Guide - Topology scenarios |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.