Created on
06-10-2025
10:12 PM
Edited on
06-11-2025
06:54 AM
By
Jean-Philippe_P
Description | This article describes the expected FortiOS behavior when management traffic is received on VRF 0. |
Scope | FortiGate v7.4.1 and later. |
Solution |
After upgrading to v7.4.1 or later, FortiOS may respond to management traffic received on VRF 0 using a different VRF and different interface, if a more specific route exists in a different VRF. This can cause the firewall to not be accessible using HTTPS and SSH after the upgrade.
VRF 0 is a special VRF that includes routes from multiple VRFs. See this document: Virtual routing and forwarding.
After the upgrade, the most specific route is used to forward replies for management traffic received in VRF 0 if the most specific route is in a different VRF.
Example configuration:
config system interface edit "port1" set vdom "root" set vrf 0 <-- Default configuration. set ip 10.255.4.31 255.255.252.0 set allowaccess ping https ssh next end
Routing Table:
get router info routing-table all
Routing table for VRF=0
Routing table for VRF=2
Packet sniffer showing different interfaces used to forward replies:
Because the most specific route to the IP address 10.254.200.200 is over port1.0003, this interface is used to forward the reply for management traffic, causing asymmetric routing and possible packet loss.
Resolution: A related issue, 952543, that affects single VRF deployments was resolved in v7.4.2, see FortiOS v7.4.2 Resolved Issues.
The multiple VRF case is expected behavior with several available workarounds and is not anticipated to be fixed.
Workarounds:
config router static edit <index> set dst 10.0.0.0 255.0.0.0 set gateway 10.255.7.254 next end
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.