Description | This article describes the capabilities of VRF0. |
Scope | FortiGate v6.x and v7.x. |
Solution |
FortiGate has been configured with one physical interface 'port3' which belongs to the default VRF and one loopback named 'loopback_Test' on VRF 1.
The routing table looks like this:
Routing table for VRF=0 Routing table for VRF=1
2023-12-12 14:23:06.771674 port3 in 10.0.1.63 -> 8.8.8.8: icmp: echo request
Test 2: This time instead of 8.8.8.8 the device generates ICMP packets to IP address 172.16.10.1 [Loopback configured on VRF 1] and it is generally expected that traffic will still match the default route on port10 since it should be contained inside the default VRF, however:
2023-12-12 14:28:22.069203 port3 in 10.0.1.63 -> 172.16.10.1: icmp: echo request
As it can be observed traffic instead of matching the default route is forwarded via port10. A reply from port3 itself will be received.
This is happening because there is no VRF isolation on VRF0 as it is considered a special global VRF that contains all routes from other VRFs as well. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.