Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
New Contributor

Default route outside of interfaces configured on Fortigate



According to this document:

you cannot configure a (default) route using a next hop which is outside of any interfaces on a FGT.

On a Windows client it's simple, you only get a warning that the default gateway is not in the same network segment, but you can continue and traffic is flowing.


Isn't there any possible way to get this solved?

Let's say by configuring a static ARP on the Fortigate, or on the Switch/router?




Valued Contributor III

Before I even attempt an answer for this, why would you want to do that?

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at:


The situation at the customer is as follows:


You have a public ISP router with i.e. the following config:

(I have changed the public IP's)

There are 2 IP packs being routed to this ISP router:


The secondary IP pack has no config on the ISP router.


Public IP ISP router:

Secondary IP pack that is being routed through: =

The Fortigate WAN has a Public IP:

So it would need to use the, The ISP router as it's default gateway.


In the /30 subnet we cannot use an IP, one is in use for the ISP router, another one is for a MPLS router.

It's possible to do this setup with a regular windows client.

You can configure an IP on a NIC and point it's default gateway to, it has access to Internet.


Hope this clarifies the config a bit.





Valued Contributor III

First of all, I haven't ever seen a Windows workstation route successfully to the Internet with an incorrect gateway. Yes, traffic will still flow to local resources on the same LAN, but after that, the workstation is dead in the water. The Fortigate will work the same way. All it needs to know is where the next hop is to send any traffic not local to itself. If you (could) specify a network off of it's attached interfaces, it will have no clue where to send the default traffic because those remote networks will be unknown to it. Traffic will just die. Grab a basic networking book and browse through it. The Internet is based on next hop, not two or three gateways away. If everyone knows who their peer is to send the unknown traffic, then Internet life is good.

Bob - self proclaimed posting junkie!
See my Fortigate related scripts at:

Esteemed Contributor III

No way this way around.

The is just too small to accomodate another router. You cannot have 3 devices in a 2-device address space. Full stop.


Assign to the FGT wan port. Default route on the FGT is

Assign any 2.2.2.x to the MPLS router and give it a default route to


"Kernel panic: Aiee, killing interrupt handler!"
Esteemed Contributor II

The way your ISP provides the public subnets are very common, which we do to our customers too. Technically the /30 subnet is just for the interface between your device (FG) and ISP's router ( for ISP side, for FG WAN IP). Then the ISP route is configured to deliver /29 subnet toward So if the device that has is a FW like FG, you can use the /29 as a routable subnet by assigning to inside interface of the FW (or you might want to split it to two /30s for two different interfaces) or you can break it up to 8 /32s and use each in VIPs.

Again, the FG WAN IP has to be