| Description | This article describes a solution for cases where FortiClient injects a default route to the Windows routing table instead of the routes specified in the split-tunnel configuration for remote access IPsec VPN. |
| Scope | FortiClient Windows v7.4.3. |
| Solution |
The following configuration is in place in the FortiGate, split tunnel is enabled, and it is set to allow access to subnet 192.168.10.0/24
config vpn ipsec phase1-interface next
With this configuration, the FortiClient should inject a single route to 192.168.10.0/24 in the Windows routing table. The IKE debugs on the FortiGate show that mode-cfg is sending the correct route for subnet 192.168.10.0/24. This can help confirm that the issue is not due to a misconfiguration on the FortiGate side.
diagnose vpn ike log filter rem-addr4 x.x.x.x
...
The Windows routing table 'route print' shows that a new default route pointing to the VPN interface was injected instead of the route to 192.168.10.0/24. The machine is ignoring the route 192.168.10.0/24 sent by the FortiGate.
This behavior is sometimes observed when the FortiClient is upgraded from version 7.2.x to version 7.4.3. At the time this article was redacted, the issue had not been reproduced in FortiClient version 7.4.4.
Solution 1: Delete the extra VPN adapters (those marked with #2) from Device Manager, then reboot the machine.
Solution 2: Uninstall FortiClient from the impacted machine, reboot, and reinstall FortiClient.
After connecting, the route table will successfully show the route to 192.168.10.0/24, and the additional default route will no longer be present.
Related documents: Technical Tip: Enable split-tunnel For IPsec VPN Technical Tip: How to uninstall a managed FortiClient in Windows Machines |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.