Description
Because the FortiGate MAC address table is updated with the physical MAC address and the virtual MAC is unknown, FortiGate floods the frame to all the ports due to an 'unknown destination MAC' when the packet arrives at FortiGate for the destination as a virtual MAC.
Because of this, FortiGate does not create a session, meaning there is no stateful firewall session entry. This can cause issues including (but not limited to) reply packet drops, and an inability to perform an antivirus scan.
config system interface
edit <interface>
set src-check disable
end
In some cases, this change becomes necessary after upgrading from v6.4 to v7. x branch. V6.4 may not offload multicast traffic in transparent mode. Beginning with FortiOS 7, multicast traffic is offloaded, which prevents the kernel from processing certain packets, such as HSRP or VRRP.
Consequently, the virtual MAC entry expires after five minutes due to the kernel's lack of visibility. When the MAC entry expires, existing sessions continue to pass traffic, but new sessions cannot be established. These new connection attempts are dropped by the FortiGate with a 'No session matched' error.
If a firewall policy is modified, FortiGate reevaluates the active sessions governed by that policy. During this process, it may repopulate the MAC address table using information from the still-active sessions.
Related documents:
Technical Tip: Transparent mode with VRRP, HSRP or Network Load Balancer
Mirroring SSL traffic in policies - FortiGate administration guide
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.