Description:
This article describes that traffic from AWS LAN hosts toward remote site via IPsec tunnel does not reach FortiGate VM deployed in AWS as EC2 instance.
Scope:
(PC1)----------(Firewall)==========IPSEC TUNNEL============(FortiGate in AWS)-----------(PC2)
When on PC 2, ping traffic is initiated to PC1, it does not reach the FortiGate in AWS.
In addition, traffic from PC1 only reaches PC2 if NAT is enabled on the FortiGate in AWS.
Solution:
In this example, port2 has an IP of 10.0.1.100/24.
The AWS ENI also has the same IP(PrivateENI).
By default, 'Change source/destination check' is enabled on every ENI. It prevents that interface in AWS from receiving any packets other than the destination IP of the interface IP itself.
If the source of the traffic is not from one of the IP addresses on the interface or destined to on the IP addresses on the interface, the traffic will be dropped.
With the current setting any packet hitting the LAN interface of the FortiGate with the destination IP other than the Interface IP will be dropped, which is valid for the traffic between PC1 and PC2.
(S: 10.1.1.1 ,D:10.1.10.1)------------------------------>(10.1.10.1)AWS ENI---> Packet is allowed.
(S: 10.1.1.1 ,D:10.1.10.10)------------------------------>(10.1.10.1)AWS ENI--->Packet is dropped.
Disabling it will allow the second packet in the example above to pass through.
Related document:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.