Hi Pirgi, you must have link monitors probes on both sites or when, on HQ site, the mpls link fail since this is a transit network the route never be removed (no interface down evnt) effectively blackholing the HQ originated routed traffic. We have some customers with a similar setup and all it's working seamlessly..some quick suggestions: - set your floating routes as same distance different priority so the route it's already installed on the RIB with a little fast failover - set link-monitor source-ip as FGT mpls facing interface ip to bind reachability path Best regards, Antonio
Hi Antonio, thanks for your answer... I have configured the link monitor only in the Branch Office, when the MPLS falls down I tryed to manually change the priority of the static route configured in the HQ for redirect traffic throught the tunnel but nothing changes. The link monitor on the Branch Office works as I expected, according to the param set update-static-route enable all the static route associated to internal port are erased from the routing table and only the tunnel route remain active.
I think the problem is routing.... and related sessions, but I haven't the solution yet. Now I focus on blackhole route for resolve the issue. In my case I have the same remote subnet can be reached by two alternative paths, but when one oh them die, I think that fortigate doesn't discard the previous sessione that use the old (down) path.... Is it possible ? or I get the wrong end of the stick... Gianni
Hi pirgi
pirgi wrote:Assuming that you have all policy correctly in place and that the tunnel it's working... Yes you have to configure a link probe on HQ to determine whether the transit network path is working end-to-end and therefore will have to remove the now invalid route when the MPLS link fail. to be more explicit: #HQ# routes: 192.168.4.0/24 via device PORT1 , gateway 192.168.8.254 , distance 5 priority 10 192.168.4.0/24 via device VPN_ROBO , distance 5 priority 15 link-monitor: srcintf PORT1 server 192.168.4.254 gateway-ip 192.168.8.254 source-ip 192.168.8.253 update-static-route enable (default) when the MPLS link it's up you have a routing table with both routes installed but with MPLS path preferred/active, something like the following from cli: FGT-LAB # get router info routing-table static S 192.168.4.0/24 [5/0] via 192.168.8.254, PORT1, [10/0] [5/0] is directly connected, VPN_ROBO, [15/0] (this is the floating route with less favorable priority 15) when the MPLS it's down on any of the two sides, the only route active should be via VPN_ROBO. On ROBO fortigate of course you have a simmetric configuration. Without the HQ probe you have a blackhole since the HQ originated and obviously ROBO return path are still routed to MPLS using the till valid route installed in the RIB of HQ fortigate!! For statefull established sessions route re-evaluation does not happen until the session expire or a new one is established.. For antileak blackhole route in case of both link fail there is already a good post here: [link]https://forum.fortinet.com/tm.aspx?m=120834#120872[/link]
thanks for your answer... I have configured the link monitor only in the Branch Office, when the MPLS falls down I tryed to manually change the priority of the static route configured in the HQ for redirect traffic throught the tunnel but nothing changes. The link monitor on the Branch Office works as I expected, according to the param .... I think the problem is routing.... and related sessions, but I haven't the solution yet. Now I focus on blackhole route for resolve the issue.
Hope this clarifies the problem better.
Best Regards, Antonio
Hello,
I was reading this post and have also contacted support regarding a similar question. In my scenario I have a backup VPN circuit but only want to disable a single static route to a hosting site when using link monitor, not all routes pointing to the MPLS interface IP.
I have multiple static routes that point to the MPLS (including the hosting site). That way if the remote location IP did not respond to a ping just that route would become inactive. Per support this is not possible and ALL static routes to the MPLS IP become inactive since it is at the interface level not a particular static route.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1113 | |
759 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.