Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Fumagalli
New Contributor III

FortiClientVPN static route

Hi, only on my computer, the static route is not created when I connect with the FortiClientVPN .
on other PCs no problem.
Do you have any advice on why it doesn't work?
S.O. win 11

 

thanks in advance

Fabrizio

 

Fabrizio
the only easy day was yesterday
Fabriziothe only easy day was yesterday
1 Solution
Fumagalli
New Contributor III

SOLVED....

Removed Update for Microsoft Windows (KB2693643)

Now works correctly

 

Fabrizio
the only easy day was yesterday

View solution in original post

Fabriziothe only easy day was yesterday
21 REPLIES 21
Fumagalli
New Contributor III

UP

Fabrizio
the only easy day was yesterday
Fabriziothe only easy day was yesterday
Fumagalli
New Contributor III

Has anyone come up with ideas this month?
Thanks in advance

Fabrizio
the only easy day was yesterday
Fabriziothe only easy day was yesterday
srajeswaran

Can you confirm the firewall policy for your VPN connection allows all service (Internet) or specific service only?

The below article talks about a dead peer detection feature on windows that will cause route change if the dpd check fails.

https://learn.microsoft.com/en-us/previous-versions/aa454008(v=msdn.10)?redirectedfrom=MSDN

Check if this feature is enabled/disabled as suggested in http://www.howtonetworking.com/Routers/deadgateway.htm

Regards,
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
Fumagalli

thank you so much for your answer
The "EnableDeadGWDetect" entry does not exist
I create it and should I set it to 0 or 1?

Fabrizio
the only easy day was yesterday
Fabriziothe only easy day was yesterday
srajeswaran

To disable dead gateway detection, set the registry value to 0.

Regards,
Suraj
- Have you found a solution? Then give your helper a "Kudos" and mark the solution.
sw2090
SuperUser
SuperUser

the route link shows you have two default routes. One via your ethernet interface and one (accoarding to its gateway ip) via the SSL VPN Interface (i.e. FortiClient).

The one via the VPN does have the higher metric which means all traffic will hit the ethernet interface except if that were down or if the traffic matches one of the other existing static/connected routes.

It also implies that there is no split tunneling enabled on your vpn since this is (execpt from the metric) the typical behaviour of FortilClient VPNs without split tunneling. 

 

-- 

"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams

-- "It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Fumagalli
New Contributor III

first of all, thank you so much for your reply

I don't understand the first part?
What do I have to change in the configuration?

Fabrizio
the only easy day was yesterday
Fabriziothe only easy day was yesterday
sw2090
SuperUser
SuperUser

well a default route is there to match all traffic that doesn't match anything else.  

If there is more than one default route the metric sets the order. Lowest metric will be used first.

Since the second default route has the ssl vpn interface as destination I suppose it has been set up by forticlient when it established your vpn. You could recheck this by re-viewing your routing table without the vpn connected. If it was set up by FortiClient it will be gone then.

You will only have static routing over your vpn when split tunneling is on. This has to be configured on the Fortigate end of the tunnel. Split tunneling will have FortiClient set up those static routes upon connecting your vpn. 

Just usually - without split tunneling - FortiClient will set up a default route with very low metric so all traffic that doesn't match any other routes will go through the vpn. Why it didn't do that in your case - cannot say.

Somitimes (e.g. in business environments) you do want all traffic to go through the vpn as long as it is connected. Then you have to have the accoarding policies on the other end of the vpn. Otherwise you would lose internet access once the vpn connected.

If you just want to be able to access specific subnets through the vpn I recommend using split tunneling and let the internet traffic still use your default route via ethernet. 

 

-- 

"It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams

-- "It is a mistake to think you can solve any major problems just with potatoes." - Douglas Adams
Fumagalli
New Contributor III

Tried several times but the problem persists

The problem is only on my Notebook
On other PCs with the same configuration on the Fortinet side (on the firewall) and in FortiClient VPN the problem does not exist

Fabrizio
the only easy day was yesterday
Fabriziothe only easy day was yesterday
Fumagalli
New Contributor III

I also reset the network cards

The only solution is to connect with "FortinetClient VPN", once the connection has been established, change the IP of the network card "FORTINET SSL VPN VIRTUAL...." assigning the ip that is displayed in the connection status
in this way , it create correct route

Fabrizio
the only easy day was yesterday
Fabriziothe only easy day was yesterday
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors