Created on 05-25-2021 11:33 PM Edited on 11-23-2021 08:20 AM By Anonymous
Description
This article explains about reply traffic which is not matching any of the configured policy routes or SD-WAN rules.
Solution
When initiate a traffic from Internet to the LAN segment is initiate (behind FGT), the traffic enters through one interface and it is possible to observe the reply traffic going out of a different interface than the original incoming interface (if there are multiple routes to reach the actual source), even though a specific policy route or SD-WAN rule for the return traffic are configured.
From firmware 6.4.0 GA, the reply traffic not matching the configured policy routes or SD-WAN rules is expected due to a behavior change.
It should not affect the firmware 6.2.x. Verify the below configuration on FortiGate to mitigate this issue:
1) Verify if there are multiple routes pointed to the actual source, either through multiple static routes or a single route pointed to SD-WAN.
2) Check if asymmetric routing is enabled. If there is VDOM configured, check inside the respective VDOM configuration.
# show full system settings | grep asymroute
set asymroute disable
set asymroute-icmp disable
set asymroute6 disable
set asymroute6-icmp disable
3) Check if auxiliary session is enabled or disabled. If there is VDOM configured, check inside the respective VDOM configuration.
# show full system settings | grep aux
set auxiliary-session disable
Use case 1.
If asymmetric routing is enabled, whether the auxiliary session is enabled or disabled, the reply traffic would go out of any of the configured interface as per the routing table.
It is not necessary for the reply traffic to go out of the original incoming interface.
Because, with asymmetric routing enabled, traffic always looks for the best route in both directions.
Use case 2.
If asymmetric routing is disabled, even though there are multiple routes to reach the actual source, it is possible to force the reply traffic to go out of the original incoming interface by disabling the auxiliary session.
Note.
In any situation, the reply traffic does not search policy routes or SD-WAN rules in firmware 6.4.x.
The behavior of checking policy routes is retained in firmware 7.0.1, where the reply traffic will look for proute match.
Related document.
https://docs.fortinet.com/document/fortigate/6.4.4/administration-guide/014295/controlling-return-pa...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.