| Description |
This article describes a scenario where intended NAT is correctly applied, but the NATted traffic is then considered local and dropped because of the configuration on an unrelated IP pool or another VIP. |
| Scope | FortiGate. |
| Solution |
An administrator might configure a virtual IP address or virtual server with the same external IP previously configured as the mappedip of another virtual IP. This is unusual but valid configuration.
config firewall vip edit vip-A set extip 10.0.10.111 set extintf any set mappedip 10.255.108.2 edit vip-B set extip 10.255.108.2 set extintf any set mappedip 172.17.10.254 next end
config firewall policy edit <index> set name "VIP-A policy" next end
An IP pool is also created for other purposes, and has an external IP on the same subnet as the mapped IP of vip-A:
config firewall ippool edit ippool-B set startip 10.255.108.2 set endip 10.255.108.2 next end
This issue can be resolved with the following steps:
config firewall ippool edit ippool-B set arp-reply disable next end
config firewall vip edit vip-B set arp-reply disable next end
While arp-reply is enabled, the local traffic verdict can be diagnosed from a flow trace.
FG3H0E-1 # diagnose debug flow show iprope enable FG3H0E-1 # diagnose debug flow show function-name enable FG3H0E-1 # diagnose debug enable FG3H0E-1 # diagnose debug flow trace start 1 FG3H0E-1 # id=65308 trace_id=1 func=print_pkt_detail line=6007 msg="vd-root:0 received a packet(proto=1, 10.0.10.254:5134->10.0.10.111:2048) tun_id=0.0.0.0 from mgmt. type=8, code=0, id=5134, seq=57778."
Even though vip-A was configured as intended and has a valid firewall policy, the firewall policy was not matched because the mapped IP address 10.255.108.2 is considered a local address (because arp-reply is enabled on vip-B and ippool-B).
Disabling the arp-reply in ippool-B only will not resolve the problem, as vip-B will induce the same behavior. It is necessary to disable arp-reply for both objects.
In FortiOS v7.0.14 and v7.2.6 or later, both IP pools and VIPs are detected as local address objects if arp-reply is enabled. Arp-reply is by default enabled on the VIPs and IP pools. For more detail of FortiOS behavior with IP pools and VIPs on different firmware versions, consult Technical Tip: IP pool and virtual IP behavior changes in FortiOS 6.4, 7.0, 7.2, and 7.4.
Related article: Technical Tip: IP pool and virtual IP behavior changes in FortiOS 6.4, 7.0, 7.2, and 7.4 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.