| Description | This article describes behavior where users are trying to add new VPN phase 2 selectors to a VPN already working but FortiGate blocks new selector's traffic. |
| Scope | FortiGate VPN Dial-Up. |
| Solution |
Users configure a VPN Dial-Up server with the features add route and device creation enabled.
config vpn ipsec phase1-interface set net-device enable
For the working selectors, validate that FortiGate has a valid route installed in the routing-table through the VPN
CPFW-043-ITO001 # get ro info routing-table details 192.168.1.0
For the non-working selectors, validate using the debugs that FortiGate has a valid route and a policy allowing the traffic
CPFW-043-ITO001 # id=65308 trace_id=2632 func=print_pkt_detail line=5811 msg="vd-root:0 received a packet(proto=1, 192.168.20.1->172.16.0.1:2048) tun_id=0.0.0.0 from port2. type=8, code=0, id=1, seq=1276."
Validate the route for the non-working selector:
CPFW-043-ITO001 # get ro info routing-table details 172.16.0.1
Run the command 'get vpn ipsec tunnel summary' to check the VPN interfaces
'VPN_EXAMPLE_c' 1.1.1.1.:1802 selectors(total,up): 1/1 rx(pkt,err): 7271366/0 tx(pkt,err): 16140651/10164
As the VPN is configured with the features add route and net-device enable, FortiGate will create VPN subinterfaces to route the traffic. This information is not shown in the routing-table.
For the working selectors, FortiGate is using the automatic routes created by the VPN with an administrative distance of 15.
For the non-working selectors, FortiGate is using manual static routes.
Solution: Delete the manual static routes and let FortiGate use the automatic routes created by the VPN. With the automatic routing creation process, FortiGate will use the subinterfaces VPN to route the traffic of the new selectors
CPFW-043-ITO001 # id=65308 trace_id=2640 func=print_pkt_detail line=5811 msg="vd-root:0 received a packet(proto=1, 192.168.20.1->172.16.0.1:2048) tun_id=0.0.0.0 from port2. type=8, code=0, id=1, seq=1284." |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.