Description | This article describes thehow to resolve the issue of SSL VPN requests being dropped by the FortiGate. The problem occurs when the firewall does not respond to requests on port 10443, despite the local-in policy being configured to allow traffic on this port. |
Scope | FortiGate. |
Solution |
When SSL VPN traffic is received on a custom port such as 10443, FortiGate must have all required SSL VPN configurations in place. Otherwise, the system does not dynamically create a matching local-in policy, resulting in dropped traffic. This behavior can be confirmed from the following debug flow trace: Debugging the packet flow
2025-06-24 10:32:58 id=65308 trace_id=21 func=__iprope_check line=2421 msg="gnum-10000f check result: ret-matched, act-drop, flag-00000801, flag2-00000000"
These log entries indicate that no valid local-in policy exists for traffic on port 10443, causing FortiGate to drop the connection.
To resolve this, ensure that all essential SSL VPN configurations are completed. This includes:
To confirm whether a dynamic Local-In Policy exists to permit traffic on port 10443.
GUI:
CLI:
diagnose firewall iprope list | grep '10443' -A 1 -B 11
Note: This behavior also applies to other types of traffic directed to the FortiGate, including BGP. If none of these steps resolve the issue, contact Fortinet Technical Support for further assistance. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.