Created on
02-27-2025
04:52 AM
Edited on
02-27-2025
11:53 PM
By
Anthony_E
Description |
This article describes a behavior where users try to run the command execute backup config ftp <filename> <ftp server>[:ftp port] <username> <password> from a remote FortiGate, but it is not possible to define a source IP for this traffic. |
Scope | Remote FTP Automations from Spoke FortiGates. |
Solution |
Users might have a topology similar to the following:
When users try to execute the FTP command from Branch FortiGate, the instruction will take the IP of the DMZ network interface as a source IP.
In this case, it will take the IP 192.168.24.1.
diag sniffer packet any 'host 192.168.25.2 and port 21 or port 20' 4 0 l
However, the FortiGate HUB has a remote network configured using another path. This will cause the HUB FortiGate to block the traffic due to the RPF mechanism.
FGT_HUB# id=65308 trace_id=298 func=print_pkt_detail line=5802 msg="vd-root:0 received a packet(proto=6, 192.168.24.1:17972->192.168.25.2:21) tun_id=10.0.0.16 from VPN. flag [S], seq 2773337279, ack 0, win 65535"
Workarounds:
Configure an IP in the VPN interface in both FortiGates:
config system interface edit vpn_int set ip 10.0.0.1/24 set remote-ip 10.0.0.2/24 end
This configuration will automatically create a route directly connected in both FortiGates to avoid blocks due to the RPF mechanism.
config vpn ipsec phase2-interface set src-subnet 0.0.0.0 0.0.0.0
|