Description
Debug flow shows those drops as 'reverse path check fail, drop':
id=13 trace_id=27 msg="VD1 received a packet(proto=1, 10.11.130.70:1->10.35.252.4:8) from Int1."
id=13 trace_id=27 msg="allocate a new session-086bf186"
id=13 trace_id=27 msg="reverse path check fail, drop"
id=13 trace_id=27 msg="trace"
Enabling logging of any ICMP dropped packets can help in troubleshooting and finding incorrect route settings.
The CLI commands are :
config log setting
set log-invalid-packet enable
end
config log setting
set extended-log enable
end
With this option enabled a log message will be logged for "ping" dropped due to anti-spoofing.
Note that this option is not limited to anti-spoofing.
It is a global parameter, independent of traffic log settings.
This setting is not rate-limited and a large volume of invalid packets will generate numerous log messages and can affect device performances.
Related article:
Technical Note: Details about FortiOS RPF (Reverse Path Forwarding), also called Anti-Spoofing
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.