| Description | This article describes the behavior when virtual-patch is enabled in a local-in policy, ICMP response packets may egress through a different interface than the one they were received on. |
| Scope | FortiGate running FortiOS version 7.2.9, 7.2.10, or earlier versions. |
| Solution |
Observed Behavior: In a setup with two WAN connections and two default routes, enabling 'virtual-patch' on a local-in policy causes ICMP responses to exit through a different interface.
Configuration Example:
config firewall local-in-policy
After applying the above configuration, ICMP echo requests sent to the 'wan1' interface IP of the FortiGate may generate echo replies that egress from 'wan2'.
2025-11-10 09:15:01 wan1 in 172.16.50.25 -> 10.10.10.1: icmp: echo request
Session Information:
session info: proto=1 proto_state=00 duration=43 expire=17 timeout=0 flags=00000000 socktype=0 sockport=0 av_idx=0 use=3
Workaround: Disable the 'virtual-patch' option in the local-in policy configuration.
Example:
config firewall local-in-policy
After disabling this option, ICMP response packets will follow the expected path through the same interface they were received on.
For more details about virtual patching on the local-in management interface, refer to the article below: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.