Hello! Hoping someone might have some insight into this, because I'm
stumped ... Setup: - 2 paths to the internet, via "port1" and down a VPN
Tunnel.- Default route is port1- 3 Virtual Servers attached to port1-
Policy routes decide where to send out...
Hello, Trying to understand what happened and how to prevent it in the
future: - Running FortiGate-VM in an Azure VM.- This FG has a custom
site-to-site IPSec tunnel to on-prem. This effectively connects the
virtual data centre to the on-premises dat...
Scenario: One "inside" server talks to another "outside" server over
HTTPS. I want to monitor and log all traffic, with as much detail as
possible. I set up firewall policies to allow the traffic (from certain
hosts to other certain hosts, on HTTP(S)...
It is not clear form the docs whether policy routes are looked at for
RPF from the docs IIRC (but i could be wrong). From what was said above,
static / kernel routes have to match first on RPF check? In which case,
the port1 route, which is still the...
That's what I've been doing ... I HAVE those two routes, configured that
way but the RPF check fails as detailed in the OP. If I do as you say,
which is what I've been trying, then traffic coming into port1 does not
find a return path, because the ma...
Ah OK I think I understand the problem then ... I'll double check, but
if you're right, then how should I handle my scenario? - I want default
outbound internet traffic to go down the tunnel,- But I want exceptions
to go out port1 (This scenario I've...