Hi,
Thanks for your input. I' m sorry if my initial post left out too many details.
First of all, all actual communicating parties are on the internal LAN and the other end of the VPN tunnel.
The accelerator device (a Riverbed Steelhead) supports a _virtual_ in-path mode (which is currently enabled). This mode allows it to operate as in-path in environments where it is not possible to physically connect it inline (for example in redundant, multi-path LANs).
When in virtual in-path mode, policy routing is used to direct packets to the device (172.21.13.10), which then, after processing, forwards them to a next hop, in this case the Fortigate DMZ-interface IP, 172.21.13.1. It is then up to the firewall' s policy routes to direct the packets to the actual endpoints.
The problem, however, seems to be that the firewall keeps redirecting the incoming packets to the accelerator device. I base this conclusion on the fact that I see a flood of pings on the DMZ interface, after sending one single packet from internal to the other side of the VPN tunnel.
Also, a traceroute from internal to remote subnet looks like this (to demonstrate, the policy routes have been changed to " set protocol 0" ):
C:\Documents and Settings\XXX>tracert -d 10.10.1.1
Tracing route to 10.10.1.1 over a maximum of 30 hops
1 <1 ms <1 ms <1 ms 10.9.13.254
2 1 ms <1 ms <1 ms 172.21.13.10
3 <1 ms <1 ms <1 ms 10.9.13.254
4 1 ms <1 ms <1 ms 172.21.13.10
5 <1 ms <1 ms <1 ms 10.9.13.254
6 1 ms <1 ms <1 ms 172.21.13.10
7 <1 ms <1 ms <1 ms 10.9.13.254
8 <1 ms <1 ms ^C
Regards,
Kristian