Created on
10-13-2025
10:34 PM
Edited on
10-16-2025
01:33 AM
By
Jean-Philippe_P
| Description |
This article describes a phenomenon that can cause certain types of local traffic (such as DNS queries) to be sent through the VPN tunnel instead of the intended routing path when using a policy-based IPsec VPN.
When this issue occurs, ping traffic destined for the gateway may also fail for the same reason. |
| Scope | FortiGate is configured with a policy-based IPsec VPN. |
| Solution |
Example Configuration:
config firewall policy edit 16 set srcintf "internal" next end
config vpn ipsec phase1 edit "icheon19_PT" set interface "wan1" set peertype any set proposal 3des-md5 set localid "icheon19_PT" next end
config vpn ipsec phase2 edit "icheon19_PT" set phase1name "icheon19_PT" next end
Observed Behavior (debug flow output):
Root Cause. This issue occurs due to the way FortiGate processes Policy-Based VPN traffic.
Workaround. To avoid this behavior, configure the policies srcaddr and dstaddr to match the Phase 2 selectors.
Corrected Configuration Example:
config firewall policy edit 16 set srcintf "internal" next end
config vpn ipsec phase2 edit "icheon19_PT" set phase1name "icheon19_PT" next end
Recommendation.
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.