Description | This article describes how to handle the RPF failure for FortiManager traffic if the fmg-source-ip is misconfigured. |
Scope | FortiGate VM, FortiGate Physical Appliances. |
Solution |
Symptoms:
In this setup, there are two branch FortiGates and one Hub, all configured with SD-WAN. As shown in the diagram, the FortiGate (Branch1) is configured to use the LAN interface IP (10.140.64.1) as the source address for communication with FortiManager. The LAN subnet is advertised via BGP to all participating peers—eBGP on the underlay and iBGP on the overlay. In this scenario, traffic destined for FortiManager is preferred via the underlay. However, since the configuration specifies a source IP that is expected to be routed through the overlay, the traffic fails the Reverse Path Forwarding (RPF) check, as it is essentially considered spoofed.
Analysis:
As shown, the traffic is going out through the underlay (port1):
Resolution:
Removing the fmg-source-ip or configuring the appropriate IP will solve the problem.
Note:
Enabling the asym-routing or turning off the RPF check under the interface settings, will not solve this problem. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.