Created on
02-27-2025
04:52 AM
Edited on
02-27-2025
11:53 PM
By
Anthony_E
Description |
This article describes a behavior where users try to run the command execute backup config ftp <filename> <ftp server>[:ftp port] <username> <password> from a remote FortiGate, but it is not possible to define a source IP for this traffic. |
Scope | Remote FTP Automations from Spoke FortiGates. |
Solution |
Users might have a topology similar to the following:
When users try to execute the FTP command from Branch FortiGate, the instruction will take the IP of the DMZ network interface as a source IP.
In this case, it will take the IP 192.168.24.1.
diag sniffer packet any 'host 192.168.25.2 and port 21 or port 20' 4 0 l
However, the FortiGate HUB has a remote network configured using another path. This will cause the HUB FortiGate to block the traffic due to the RPF mechanism.
FGT_HUB# id=65308 trace_id=298 func=print_pkt_detail line=5802 msg="vd-root:0 received a packet(proto=6, 192.168.24.1:17972->192.168.25.2:21) tun_id=10.0.0.16 from VPN. flag [S], seq 2773337279, ack 0, win 65535"
Workarounds:
Configure an IP in the VPN interface in both FortiGates:
config system interface edit vpn_int set ip 10.0.0.1/24 set remote-ip 10.0.0.2/24 end
This configuration will automatically create a route directly connected in both FortiGates to avoid blocks due to the RPF mechanism.
config vpn ipsec phase2-interface set src-subnet 0.0.0.0 0.0.0.0
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.