Created on 
    
	
		
		
		02-27-2025
	
		
		04:52 AM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
  Edited on 
    
	
		
		
		02-27-2025
	
		
		11:53 PM
	
	
	
	
	
	
	
	
	
	
	
	
	
	
 By  
				
		 Anthony_E
		
			Anthony_E
		
		
		
		
		
		
		
		
	
			 
		
| Description | This article describes a behavior where users try to run the command execute backup config ftp <filename> <ftp server>[:ftp port] <username> <password> from a remote FortiGate, but it is not possible to define a source IP for this traffic. | 
| Scope | Remote FTP Automations from Spoke FortiGates. | 
| Solution | Users might have a topology similar to the following: 
 When users try to execute the FTP command from Branch FortiGate, the instruction will take the IP of the DMZ network interface as a source IP. 
 In this case, it will take the IP 192.168.24.1. 
 diag sniffer packet any 'host 192.168.25.2 and port 21 or port 20' 4 0 l 
 However, the FortiGate HUB has a remote network configured using another path. This will cause the HUB FortiGate to block the traffic due to the RPF mechanism. 
 FGT_HUB# id=65308 trace_id=298 func=print_pkt_detail line=5802 msg="vd-root:0 received a packet(proto=6, 192.168.24.1:17972->192.168.25.2:21) tun_id=10.0.0.16 from VPN. flag [S], seq 2773337279, ack 0, win 65535" 
 
 Workarounds: 
 
 
 
 
 Configure an IP in the VPN interface in both FortiGates: 
 config system interface edit vpn_int set ip 10.0.0.1/24 set remote-ip 10.0.0.2/24 end 
 This configuration will automatically create a route directly connected in both FortiGates to avoid blocks due to the RPF mechanism. 
 
 
 config vpn ipsec phase2-interface          set src-subnet 0.0.0.0 0.0.0.0 
 
 | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.