FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
rbarnes
Staff
Staff
Article Id 367841

 

Description

This article describes a scenario where a BGP route comes from an unexpected interface. In this scenario, an IPsec VPN tunnel setup with BGP is used.

Scope FortiGate.
Solution

A BGP route is coming from an unexpected interface. The expected behavior is it should be listed for the tunnel.

 

For example:

 

get router info routing-table bgp

Routing table for VRF=0

B       192.168.33.0/24 [200/0] via 192.168.194.50 (recursive is directly connected, port3), 00:11:48, [1/0]

 

To fix this issue run the following commands:

 

config router bgp

    config neighbor

        edit "10.150.70.2"

            set next-hop-self enable

            set remote-as 6520

        next

end

 

This can also be done on the GUI.

 

bgpunexpectedinterfaceb.png

 

bgpunexpectedinterface2b.png

 

get router info routing-table all

  Routing table for VRF=0

S*      0.0.0.0/0 [10/0] via 10.9.15.254, port1, [1/0]

C       10.9.0.0/20 is directly connected, port1

C       10.150.70.1/32 is directly connected, bgpfun

S       10.150.70.2/32 [5/0] via bgpfun tunnel 192.168.194.50, [1/0]

B       192.168.33.0/24 [200/0] via 10.150.70.2 (recursive via bgpfun tunnel 192.168.194.50), 1d22h28m, [1/0]