Created on
04-17-2015
07:41 AM
Edited on
12-11-2025
10:20 PM
By
Jean-Philippe_P
Description
Solution
When traffic arrives on the FortiGate, a route lookup is performed to determine which outgoing interface should be used. If the incoming interface matches the outgoing interface, then the FortiGate may allow this traffic to flow even if a Firewall Policy has not been created to allow this traffic explicitly.
This behavior is controlled by the allow-traffic-redirect option, which has different default settings depending on the FortiOS version and can be modified under config system global in the CLI:
config system global
set allow-traffic-redirect [ enable | disable ]
end
When this option is set to enable, the FortiGate will allow traffic to flow in/out on the same interface without requiring a matching Firewall Policy to be created (aka 'implicit-allow'). When this option is set to disable, the FortiGate will require a Firewall Policy to be added to allow traffic to flow in/out on the same interface; otherwise, traffic will not be allowed to flow (aka 'implicit-deny').
Important Note: As of FortiOS v7.6.5 and later, the default setting for allow-traffic-redirect (and the IPv6-equivalent ipv6-allow-traffic-redirect) is set to disable (in earlier FortiOS versions, the default setting for this was enable). Furthermore, upgrading to FortiOS v7.6.5 or later will modify existing configurations and set these CLI options to disable if they were not already set.
If same-interface traffic is required in the network environment, then make sure that an appropriate Firewall Policy has been created to explicitly allow this flow; otherwise, traffic may be blocked by implicit-deny upon upgrading firmware. For more information, refer to the following documents:
How the Source IP of an incoming packet changes the behavior of allow-traffic-redirect:
The combination of the enable/disable status of allow-traffic-redirect and the source IP of the packet can lead to the following scenarios when traffic must ingress and egress on the same interface:
Take note that anti-replay may need to be disabled on Firewall Policies where traffic ingresses and egresses on the same interface, otherwise TCP packets may be treated as replayed traffic and may be dropped:
config firewall policy
edit <policy_id>
set anti-replay [ enable | disable ] <--- Default is enable
next
end
Notes:
Related articles:
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.