Description | This article describes that with multiple VRFs configured, traffic still gets routed via VRF0 instead of VRF1 despite having source-ip configured and route present in the routing table. |
Scope |
FortiGate, VPNv4 routes, VRF setup. |
Explanation |
There are two VRFs configured:
FGT # get router info routing-table all Routing table for VRF=0
Routing table for VRF=1
Locally originated traffic needs to be routed via VPN_A or VPN_A routes that are present in VRF=1.
config log syslogd setting
Source-IP for Syslog locally originated traffic is also configured in VRF1.
config system interface Traffic can be seen leaving the FortiGate on the WAN1 interface instead of the VPN_A or VPN_B tunnel: 2024-07-31 09:31:30.279161 wan1 out 10.5.6.12.6852 -> 10.8.2.53.514: udp 553 2024-07-31 09:31:30.279197 wan1 out 10.5.6.12.6852 -> 10.8.2.53.514: udp 553
Since the default routes via BGP in VRF1 are VPNv4 routes, the traffic fails to be routed via VRF1 and still uses VRF0 to route locally originated traffic via the normal IPv4 default route that is via wan1. Routing table for VRF=1 This is the expected behavior of FortiOS where locally originated traffic via VPNv4 routes would not use the VPNv4 routes. There is a NFR raised for this and this might be added in future releases. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.