Hello, guys,
So, I ran into this weird issue. I have two redundant tunnels on FGT600E, running 6.0.8. Config of both tunnels is identical, only remote gateway setting differs. Static routes are configured with different distance, routes to primary tunnel have distance of 10, routes to secondary tunnel have distance of 20. The problem is that when primary tunnel goes down, Fortigate still uses the route and doesn't use secondary tunnel's routes, and no traffic is routed through secondary tunnel. And, of course, when packets come through the secondary tunnel from the other side, they get dropped because of reverse path check fail. Anyone heard of a bug here? Any suggestions? I tried to play with priority as well, the result is the same.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
check this doc to see if its all compliant:
Regards,
tioeudes
lynx wrote:Hello, guys,
So, I ran into this weird issue. I have two redundant tunnels on FGT600E, running 6.0.8. Config of both tunnels is identical, only remote gateway setting differs. Static routes are configured with different distance, routes to primary tunnel have distance of 10, routes to secondary tunnel have distance of 20. The problem is that when primary tunnel goes down, Fortigate still uses the route and doesn't use secondary tunnel's routes, and no traffic is routed through secondary tunnel. And, of course, when packets come through the secondary tunnel from the other side, they get dropped because of reverse path check fail. Anyone heard of a bug here? Any suggestions? I tried to play with priority as well, the result is the same.
how do you manage your 2 WAN links via SDWAN?
I have previous setup before HQ and Branch have 2 WAN links each. Both WAN links and VPN are member of SDWAN. SD WAN rules dictates my VPN traffic and internet access as well.
HQ |<ISP 1> IPSEC <ISP 1> |Branch
|<ISP 2> IPSEC <ISP 2> |
Might to take a look on this link as well as reference.
https://kb.fortinet.com/kb/documentLink.do?externalID=FD41297
Fortigate Newbie
Check out your dead peer detection settings. From memory the default is 60 seconds (ie the VPN will stay active even when it's disconnected for 60 seconds before the routes get flushed and the new tunnel is used).
I'd recommend changing the DPD on the IPSEC VPNs on both sites. Below example will bring down the tunnel after 3 seconds.
config vpn ipsec phase-interface
edit vpn1
set dpd-retryinterval 1
set dpd-retrycount 3
end
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1643 | |
1069 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.