Description | The article explains why a static route fails to select the corresponding IPsec interface in the routing table, and instead, the interface displayed is Null0, and the route is Inactive. |
Scope | FortiGate . |
Solution |
The following is a valid configuration setup for a site-to-site IPsec tunnel:
config vpn ipsec phase1-interface edit "TestVPN" end
config router static edit 1 end
The tunnel is up, but no traffic is passing through because the static route points to the Null0 interface, leaving the route inactive, as shown below
Routing table for VRF=0
In general, when IPsec aggregate interface tunnels are created, an aggregate interface should be created for these tunnels. The aggregate interface should be used to add a route to the static routing table.
However, for some reason(During a FortiConverter migration or a manual config migration), if an aggregate-member functionality is enabled on a normal site-to-site tunnel, but an aggregate member and aggregate interface are not created, the added static route will always show Null0 interface in the routing table.
Solution: If the tunnel is intended for site-to-site use and IPsec load balancing is not required, disabling the aggregate member option in Phase 1 will resolve the issue. Otherwise, complete the setup for the IPsec aggregate using Technical Tip: IPsec aggregate for redundancy and traffic load-balancing.
config vpn ipsec phase1-interface edit "TestVPN" set aggregate-member disable next end
FortiGate # get router info routing-table details 172.16.10.1 Routing table for VRF=0
Related articles: Technical Tip: How to identify Inactive Routes in the Routing Table Technical Tip: IPSec tunnel is up but the route in routing table shows inactive |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.