Description | This article describes a known limitation of NAT64 and NAT46 IP pools: to process reply traffic correctly, the IP pool must not overlap with any device interface IP address. |
Scope | FortiGate v7. |
Solution |
After configuring NAT64 or NAT46 as shown in FortiOS v7.4.7 Administration Guide: NAT46 and NAT64 policy and routing configurations, if the IP pool was misconfigured to use the same IP address as the outgoing interface, reply traffic will be dropped by the FortiGate.
NAT64 Topology:
Example NAT64 Configuration:
config firewall vip6
edit "test-ippool4-1" next
config firewall policy
Diagnostics:
A packet sniffer shows reply packets arriving on internal1, but they are not forwarded using naf.root:
diagnose sniffer packet any "icmp or icmp6" 4 0 l internal2 in 2000:10:1:100::42 -> 2000:10:1:100::40: icmp6: echo request seq 1
Debug flow shows that the echo reply is routed to the root (local) interface: diagnose debug flow filter proto 1 diagnose debug flow filter addr 192.168.15.2 diagnose debug flow trace 100 diagnose debug enable
id=65308 trace_id=201 func=print_pkt_detail line=5938 msg="vd-root:0 received a packet(proto=1, 192.168.15.2:62518->192.168.15.15:0) tun_id=0.0.0.0 from internal1. type=0, c
Resolving the issue:
Adjust the ippool so that it does not overlap with the outgoing interface. config firewall ippool edit "test-ippool4-1" next
After this change, ICMP echo replies undergo intended reverse NAT and are forwarded back to the client.
diagnose sniffer packet any "icmp or icmp6" 4 0 l
internal2 in 2000:10:1:100::42 -> 2000:10:1:100::40: icmp6: echo request seq 1 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.