Description | This article describes that if clients are connecting to tunnel mode SSID on the FortiGate and use VPN to connect to internal resources, then the connection won't work. |
Scope | FortiGate v7.4.X and v7.6.X. |
Solution |
When clients connect to tunnel mode SSID and then establish a dialup IPsec configured on the interface on the FortiGate, then the traffic to internal resources may not work as expected.
In this scenario the clients can establish the IPsec connection, however, when trying to access some resources via the tunnel, the clients won't succeed. When using diagnose commands, it's observed that the traffic is dropped by the FortiGate due to "reverse path check fail, drop" error:
2025-02-24 13:13:15 id=65326 trace_id=4 func=print_pkt_detail line=5873 msg="vd-root:0 received a packet(proto=1, 10.10.10.2:1->172.18.1.22:2048) tun_id=10.10.10.2
Configuration example:
config system interface edit "Guest WiFi" next edit "Remote User VPN"
config wireless-controller vap
config vpn ipsec phase1-interface
There is a workaround for this problem if the setting capwap-offload is set to disable.
config system npu set capwap-offload disable end |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.