Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
AZFortinetMember335
New Contributor II

Possible Bug: VPN Tunnel Name Change causes Firewall Policies to not work

I don't know if this is the correct place to post this but we found a possible bug. We had our test IPSec Dialup tunnel successfully setup and routing rules implemented. Last week our team started converting the setting from our test setup to how we want our production settings to be.

 

During this process the team changed the PSK, Peer ID and name of the VPN tunnel. After these changes were saved traffic no longer was being routed to the correct destination. I found that DNS queries were traveling down the tunnel and traffic was being denied. We changed everything back to the way it was during testing and there was no change to behavior. Everything was still being blocked.

 

Then I was reviewing the interface for the VPN tunnel and noticed that the 'Security Fabric Connection' was still checked from a previous test we were working on. I unchecked the box it okay and all traffic for the VPN tunnel started routing correctly again.

 

So I went back to the VPN tunnel and changed the name again. As soon as that happens the VPN tunnel drops. I connect back and traffic is again blocked. I now go to the interface for the VPN tunnel and check 'HTTPS' and click ok. Traffic immediately starts flowing again. I then uncheck 'HTTPS' and traffic still flows.

 

So it seems that re-naming tunnels can cause an issue with how the Firewall evaluates the traffic causing unintended routing problems. Hopefully this helps someone in the future as this was by pure luck that we found the problem.

 

We are currently running 7.4.8 with FortiClient 7.4.3.

 

6 REPLIES 6
BillH_FTNT
Staff
Staff

HI @AZFortinetMember335 

Did you change the tunnel name in Firewall ? Can you snapshot where you put "https" ? 

Thanks

Bill

AZFortinetMember335
New Contributor II

Ok, so for example we start out with the Tunnel name and change it here to IPSEC-Dialup-03.StartOfTunnelName.png

The traffic will stop adhering to Firewall policies until you go to the interface for the tunnel and make a change to the interface. I only made changes to the Administrative Access portion of the interface. I didn't test if any change would fix this. So after I go to the interface I click HTTPS and save the change. As soon as that is done traffic flows as designed. Going back into the interface and unchecking HTTPS and saving does not change the behavior after it is 'fixed'.

NewTunnelName.png

ede_pfau
SuperUser
SuperUser

Nice find, thanks for sharing.

 

Would you be so kind to open a support case to make FTNT aware of this bug? Apparently, an internal table (translating a name string to a tunnel ID) will only be refreshed if other changes are made.

 

Just copy&paste your post to the ticket, and while I do not expect FTNT to have a patch ready for this, it will trigger a bug ticket which eventually will lead to a fix in a future patch.

 

Ede Kernel panic: Aiee, killing interrupt handler!
Ede Kernel panic: Aiee, killing interrupt handler!
AZFortinetMember335
New Contributor II

I submitted a ticket, thanks for verifying it wasn't just an us issue.

BillH_FTNT

Hi @AZFortinetMember335 

 

I will reproduce the issue in my lab. Could you please upload the configuration to the ticket? This will help us identify the exact version and setup, increasing the chances of reproducing the issue and finding the root cause. Thanks!

 

Regards

Bill

AZFortinetMember335
New Contributor II

@BillH_FTNT 

Ok, uploaded the current config.

Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors