Description | This article describes how to troubleshoot the multipoint dial-up IPsec VPN deployment issue, where FortiGate could send return traffic through the wrong tunnel instance, which might lead to asymmetric routing and dropped connections. |
Scope | SD-WAN or ADVPN hub-spoke deployment. |
Solution |
Root Cause: FortiGate handles all dial-up tunnels on the same port as a logical port. It is unable to bind the response traffic to a particular tunnel instance. Even with proper routing, the response traffic can be sent out through any tunnel under that port.
In an ADVPN hub and spoke architecture, both Spoke_1 and Spoke_2 advertise the identical subnet to the hub via BGP. When Spoke_1 initiates traffic toward the subnet located behind the hub, the hub erroneously updates the gateway IP in its session table, causing the return traffic to be forwarded to Spoke_2.
get router info routing-table details 172.18.55.195/3 Routing entry for 172.18.55.195/32
Both recursive next hops are resolved to VPN1, but FortiGate does not recognize the difference between tunnel instances (VPN1_1 / VPN1_2).
The return traffic is sent via VPN1_1, even though the original session was received via VPN1_2.
Recommended changes:
show vpn ipsec phase1-interface Tunnel-name
So the 100.91.3.14 should be configured in the right VDOM. After that, flush IKE (diagnose vpn ike gateway flush name) on the Hub and Spoke.
Troubleshooting Tip: Packet distribution for aggregate dial-up IPsec tunnels using location ID Troubleshooting Tip: Embedded SD-WAN SLA information in ICMP probes |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.