| Description | This article describes how it is not possible to connect to the Security Fabric root when the root is over an IPsec tunnel which is part of an aggregate IPsec. |
| Scope | FortiGate. |
| Solution |
Special note 7.4.8:
Starting from version 7.4.8, users must be able to select aggregate links as part of the security fabric interfaces connection in the GUI. However, the aggregate links still do not work for the security fabric connection.
Run the following debug commands:
diagnose debug reset diagnose debug flow filter clear diagnose debug flow filter port 8013 diagnose debug flow show iprope enable diagnose debug flow show function-name enable diagnose debug console timestamp enable diagnose debug enable diagnose debug flow trace start 7777
In the debug commands, FortiGate blocks the traffic due to policy 0.
id=65308 trace_id=2342 func=print_pkt_detail line=5938 msg="vd-VDOM_1:0 received a packet(proto=6, 10.0.100.2:4469->10.0.15.4:8013) tun_id=10.0.15.1 from VPN_AGGREGATE. flag [S], seq 445012612, ack 0, win 14600" id=65308 trace_id=2685 func=__iprope_check line=2412 msg="gnum-10000e check result: ret-matched, act-accept, flag-00000001, flag2-00000000"
FortiGate checks the administrative policies but there are no entry for the VPN aggregate interfaces.
diagnose firewall iprope list 10000e The other VPNs have an entry for the security fabric port:
policy index=429
To find the interface index ID run:
diagnose netlink interface list
Basically, there are no administrative policies in FortiGate for the VPN aggregate links through port 8013, meaning this interface will not work in a security fabric connection. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.