FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
sfernando
Staff
Staff
Article Id 392684
Description This article describes the items that must be verified when a VDOM in FortiGate is converted from policy-based to profile-based. 
Scope FortiGate, VDOM, Profile-based.
Solution

When a VDOM is changed from policy-based to profile-based base there can be situations where certain issues might occur, especially with loopback interfaces.

 

In such instances, consider the following configurations and make sure they are correctly configured.

 

  1. Loopback Interface Configuration.

Ensure the loopback interface still has the correct IP address and is enabled.
Confirm that ping, HTTPS, and SSH are allowed on the loopback interface.

  1. Firewall Policies.

In profile-based mode, it is required to configure explicit firewall policies for traffic to reach the loopback interface.
Create a policy from the WAN interface to the loopback interface allowing the necessary services (ping, HTTPS, SSH).

  1. Routing.

Ensure there is a route back to the source IPs trying to access the loopback.
If the loopback IP is public, make sure it’s advertised properly or reachable via a static/default route.

  1. VIP or DNAT.

If the public IP is NATed to the loopback, ensure the VIP (Virtual IP) or DNAT rules are still in place and correctly mapped.

  1. Security Profiles.

In profile-based mode, security profiles (like IPS, AV, etc.) can block traffic if misconfigured.
Temporarily disable profiles in the policy to test if they are causing the issue.

  1. Session Helper or Local-In Policies.

Check if any local-in policies are blocking access to the loopback.

  1. NAT Settings.

If NAT is enabled in the policy, ensure it’s not overriding the destination IP or causing asymmetric routing.