Created on
‎05-26-2025
04:01 AM
Edited on
‎06-13-2025
01:44 AM
By
Jean-Philippe_P
Description | This article describes how to troubleshoot when BGP packets are routed to an incorrect interface. |
Scope | FortiGate. |
Solution |
The spoke has two WAN interfaces (and two IPsec tunnels). When the BGP is negotiated on the primary IPsec (on wan1) and disable the wan1 interfaces. After the DPD timeout, the tunnel goes down. The routing table is properly updated, but the BGP is still sending messages out over the primary IPsec tunnel (the one that is down at that moment). The routing table when WAN1 is down (on the spoke):
The sniffer that shows the BGP packets on the spoke:
To stop the sniffer, press Ctrl + C.
As per the sniffer, it is observed that even when the WAN1 interface is down, BGP packets are being sent over the primary tunnel, which leads to flapping of BGP.
Upon checking the kernel routes, it is observed that a route with the same source/destination is present, which is being used for health check:
tab=254 vf=0 scope=0 type=1 proto=17 prio=0 172.18.0.2/255.255.255.255/0->172.18.0.254/32 pref=0.0.0.0 gwy=x.x.x.x dev=27(HUB_AWS_11)
Solution: BGP packets will follow the same route and be sent to HUB_AWS_11, as they match the destination and source. Hence, it is important to make sure the health check is using a different source or destination, so it will not affect BGP packets. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.