Description
Solution
By design and by default, if during the routing decision is determined that the packet which ingresses over port1, for example, should egress as well over port1 (with no VLAN tag change, no DNAT, or no IPSEC encapsulation/decapsulation) packet is sent back over port1.
This behavior is by default enabled, but it can be modified under system global settings.
config system global
set allow-traffic-redirect enable*|disable <- Default value.
end
The combination of the enable/disable status of 'allow-traffic-redirect' and the source IP of the packet can lead to the following scenarios:
When an IPv4 policy is needed to forward the traffic over the same interface that it came from then anti-replay would need to be disabled for TCP traffic so that the traffic will not be dropped as replayed traffic.
config firewall policy
edit <policy ID>
set anti-replay enable*|disable <- Default value.
end
For the public Cloud VMs, the status of 'allow-traffic-redirect' is always set to disable due to one-arm traffic.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.