Created on
08-17-2025
09:53 PM
Edited on
08-24-2025
09:28 PM
By
Anthony_E
Description | The article discusses asymmetric traffic observed during IPsec over TCP tunnel negotiation in an SD-WAN dual WAN setup. |
Scope | FortiGate. |
Solution |
Two WAN interfaces, wan1 and wan2, have been set up in SD-WAN:
wan1 IP: 10.1.1.2/30 wan2 IP: 172.16.1.2/30
SD-WAN configuration:
config system sdwan
This issue occurs with TCP. The tunnel configuration is shown below.
config vpn ipsec phase1-interface set transport tcp set transport tcp
During tunnel negotiation, it was observed that the SYN packets come in on one interface (wan1) while the SYN/ACK packets go out through another interface (wan2).
2025-06-23 03:05:11.766062 wan1 in 192.168.1.2.51717 -> 10.1.1.2.443: syn 164043747 2025-06-23 03:05:11.766215 wan2 out 10.1.1.2.443 -> 192.168.1.2.51717: syn 3416450666 ack 164043748
This behavior has been observed when using any ike-tcp-port. The behavior has been reported in engineering case 1172040 and has been resolved in v7.4.9, v7.6.4, and v8.0.0.
The workaround in the current version is as follows:
config router policy edit 1 set src 10.1.1.2/255.255.255.254 next end
config system setting set ike-policy-route enable end
Related article: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.