Description | This article describes how to prevent duplication of self-generated traffic in Transparent mode. |
Scope |
FortiGate. |
Solution |
In Transparent Mode, for self-generated traffic, FortiGate uses ARP to learn the MAC address of a directly connected destination IP or the gateway IP for destinations reached via a static gateway.
The following example illustrates the circumstance under which self-generated traffic duplication can occur for a Transparent Mode Syslog server at IP 192.168.1.1, reachable via gateway IP 10.10.10.2:
FGT (VDOM1)# config system settings set opmode transparent set manageip 10.10.10.1/255.255.255.0 end
FGT (VDOM1)# config log syslogd3 override-setting set status enable set server "192.168.1.1" set format cef end
FGT (VDOM1)# config router static edit 1 set gateway 10.10.10.2 next end
Initially, Transparent Mode will learn the MAC address for the gateway IP 10.10.10.2, which can be verified using the command below:
FGT (VDOM1) # get system arp Address Age(min) Hardware Addr Interface 10.10.10.2 88694 aa:aa:aa:aa:aa:aa VDOM1.b
FortiGate looks up the egress interface based on the destination MAC address aa:aa:aa:aa:aa:aa in the forwarding table and forwards the traffic through Vlan10:
FGT (global) # diagnose netlink brctl name host VDOM1.b show bridge control interface VDOM1.b host. fdb: hash size=32768, used=2471, num=2794, depth=71, gc_time=4, ageing_time=3 Bridge VDOM1.b host table port no device devname mac addr ttl attributes 13 86 Vlan10 aa:aa:aa:aa:aa:aa 0 Hit(0)
If multiple VLANs, including Vlan10, are connected to the same gateway port and share the same MAC address aa:aa:aa:aa:aa:aa, self-generated traffic will be sent with different VLAN tags in their respective forwarding domains.
As per the below forwarding table, Vlan10 and Vlan20 have the same gateway's MAC aa:aa:aa:aa:aa:aa, and duplicate self-originated packets can be sent to the syslog server against both the VLANs.
FGT (global) # diagnose netlink brctl name host VDOM1.b show bridge control interface VDOM1.b host. fdb: hash size=32768, used=2471, num=2794, depth=71, gc_time=4, ageing_time=3 Bridge VDOM1.b host table port no device devname mac addr ttl attributes 13 86 Vlan10 aa:aa:aa:aa:aa:aa 0 Hit(0) 14 87 Vlan20 aa:aa:aa:aa:aa:aa 0 Hit(0)
ICMP duplicate replies may occur when pinging gateway IP 10.10.10.2, as FortiGate cannot determine the correct interface and sends the request from both VLANs, resulting in duplicate replies:
FGT (VDOM1)# execute ping 10.10.10.2 PING 10.10.10.2 (10.10.10.2): 56 data bytes 64 bytes from 10.10.10.2: icmp_seq=0 ttl=64 time=1.2 ms 64 bytes from 10.10.10.2: icmp_seq=0 ttl=64 time=3.7 ms (DUP!) 64 bytes from 10.10.10.2: icmp_seq=1 ttl=64 time=0.9 ms 64 bytes from 10.10.10.2: icmp_seq=1 ttl=64 time=2.4 ms (DUP!) 64 bytes from 10.10.10.2: icmp_seq=2 ttl=64 time=2.1 ms 64 bytes from 10.10.10.2: icmp_seq=2 ttl=64 time=4.1 ms (DUP!) 64 bytes from 10.10.10.2: icmp_seq=3 ttl=64 time=4.2 ms 64 bytes from 10.10.10.2: icmp_seq=3 ttl=64 time=8.7 ms (DUP!) 64 bytes from 10.10.10.2: icmp_seq=4 ttl=64 time=3.0 ms
This is expected behavior when the gateway device port shares the same MAC for multiple VLANs and can be resolved by configuring the gateway device to generate a unique MAC for each VLAN, such as using emac-vlan. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.