Description | This article describes how it is possible to achieve the requirement of routing local traffic for backup configuration through a specific interface. |
Scope | FortiGate. |
Solution |
There are some requirements when wanting to specify outgoing traffic for backup traffic.
FGT-----IPSEC Tunnel-----TFTP Server (172.20.0.1).
Assume a scenario when using an external device that does SSH on FortiGate, takes backup, and saves to TFTP. It is similar to running execute backup config tftp config.txt 172.20.0.1 on the FortiGate CLI. It is expected traffic to leave outside the IPsec tunnel as the Server is across the tunnel, but it is leaving outside through internal 5.
While checking the route for the TFTP server with get router info routing-table details 172.20.0.1, it shows the route is active through the IPsec tunnel and internal 5 interfaces, as both are part of the SD-WAN. Since this is local traffic, it can choose any interface while leaving, and there is no option on the device to specify an interface for this traffic.
Steps to Fix This:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.