Created on
04-12-2023
06:24 AM
Edited on
01-08-2026
10:09 PM
By
Jean-Philippe_P
| Description |
This article describes how reply traffic forwarded by the FortiGate (i.e., server traffic being forwarded back to the client) is impacted by policy-based routing, as well as auxiliary sessions and asymmetric routing. |
| Scope |
FortiOS v6.4.0 through v6.4.9, FortiOS v6.4.10/v7.0.1 and later |
| Solution |
As a primer, policy routes created on the FortiGate are typically created for the purposes of overriding the routing for outgoing traffic. For example, an admin might use a policy route to send traffic sourced from a specific client towards a different next-hop gateway/interface, rather than following the main routing table.
However, policy routes can also affect the routing of reply traffic, which can be useful in cases where two different next-hop gateways can be used to reach a given remote network. Consider the following example topology:
In the above topology, the Client (172.16.0.100) would send traffic towards the Server (10.0.0.100) via Router 1 (192.168.0.254), and reply traffic from the Server needs to be routed back towards the client using a different next-hop gateway than the one configured for the default route in the routing table.
In FortiOS v6.2, the FortiGate automatically utilizes the policy route against the reply traffic, and so reply traffic from the Server would be routed towards the Client via Router 1.
In FortiOS v6.4.0 through FortiOS v6.4.9, as well as FortiOS v7.0.0, the behavior was changed as per Change #608748, and so policy routes were no longer matched for reply traffic. In this case, reply traffic from the Server would instead be routed towards the Default Router (192.168.0.1) as per the main routing table, and so communication would be incomplete.
Finally, in FortiOS v6.4.10, v7.0.1, and all later versions, the behavior was updated as per Change #718512 to the following:
Note that the auxiliary-route and asymroute settings are generally reserved for environments where asymmetric route flows are expected to occur. To learn more about what these settings affect when enabled, review the links in the Related Documents section below.
Related documents: Controlling return path with auxiliary session Technical Tip: How the FortiGate behaves when asymmetric routing is enabled |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.