Created on
06-12-2023
01:12 AM
Edited on
01-06-2026
12:59 AM
By
Jean-Philippe_P
| Description |
This article describes how to fix the asymmetric ICMP reply from the Hub to the Spoke. |
| Scope | FortiGate. |
| Solution |
The setup is a Dial-up IPsec VPN Hub and Spoke. Both are in SD-WAN and use static routes.
The Hub has only one VPN tunnel that connects to multiple spokes that have multiple VPN tunnels each going to the same LAN network.
When using Performance SLA, the Hub ICMP reply is forwarded to the wrong Spokes VPN tunnel, which is asymmetric.
Spoke1 # diagnose sniffer packet any "host 10.249.2.102 and icmp" 4 0 l Using Original Sniffing Mode interfaces=[any] filters=[host 10.249.2.102 and icmp] 1.153896 VPN1 out 10.99.3.54 -> 10.249.2.102: icmp: echo request 1.154027 VPN2 out 10.99.3.54 -> 10.249.2.102: icmp: echo request 1.155771 VPN1 in 10.249.2.102-> 10.99.3.54: icmp: echo reply 1.156438 VPN1 in 10.249.2.102-> 10.99.3.54: icmp: echo reply
Solution: Step 1: Configure location-id on Spokes.
Purpose of location-id:
Configuration Example:
config system settings
Notes:
Step 2: Flush IKE on Hub and Spokes.
diagnose vpn ike gateway flush
This ensures the new location-id is applied and tunnels are re-initialized.
Step 3: Verify Symmetric ICMP Reply. After applying the location-id, ICMP replies are sent via the same tunnel that received the request:
Spoke1 # diagnose sniffer packet any "host 10.249.2.102 and icmp" 4 0 l 1.153896 VPN1 out 10.99.3.54 -> 10.249.2.102: icmp: echo request
Example HUB tunnel info:
name=HUB1_0 ver=1 serial=8 172.16.10.254:500 -> 172.16.10.1:500 tun_id=172.16.10.1 dst_mtu=1500 dpd-link=on remote_location=1.1.1.1 weight=1
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.