| Description | This article describes why traffic may fail even when a Policy-Based Route (PBR) is configured, and a firewall policy is still required for the same traffic to be allowed. Administrators sometimes assume that once PBR is configured to direct traffic through a specific outgoing interface, the traffic will be automatically allowed. However, this is not the case; firewall policies are still mandatory. |
| Scope | FortiGate. Policy-Based Routing (PBR). Firewall Policies. |
| Solution |
Administrators may observe the following:
In some cases, disabling PBR allows the traffic to pass normally.
Typical log behavior: No matching firewall policy.
Cause:
Traffic hits the implicit deny (policy 0). This results in:
PBR = Routing decision.
Common Scenarios Where This Occurs:
Solution:
Navigate to: Policy & Objects → Firewall Policy → Create/Edit Policy.
Key requirements: Incoming Interface = Source LAN interface.
CLI Example:
Use:
Then check:
Hit count should increase during testing.
After the firewall policy is added, traceroute should complete. Traffic should hit the correct allow policy.
Verification:
Debug Flow (if needed):
diagnose debug flow filter addr <source_IP>
It should now show:
Allowed by policy X
Conclusion: Policy-Based Routing controls how traffic is forwarded, but does not override firewall security policies. A correct and matching firewall policy is always required to allow traffic, even if PBR already routes the packet.
Without the firewall policy: Traffic matches the PBR but is dropped by implicit deny, resulting in timeouts, unreachable destinations, and no policy hits Adding the correct firewall policy ensures traffic flows successfully through the PBR-defined path. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.