Some time i got anomaly traffic like below pic.
We can see below my NPM server (10.103.248.55) monitor on of my VM on azure (10.201.1.7).
All non PING traffic have right path where the traffic routed to Azure Tunnel Interface.
But PING traffic routed to the internet so my NPM server detect this VM as down.
If we restart the NPM server then the PING traffic routed to the right interface.
Anyone ever facing same issue with me?
Dear HS08,
My suggestion is to check the session list for source IP 10.103.248.55 and destination IP 10.201.1.7 and compare the ingress/egress interface + duration of the session.
It could be possible that the non working traffic (allowed by policy No18 ) is allowed when the IPSec tunnel AZURE was down and traffic was allowed by your 'lan to WAN' policy and routed via the default route . Do you have a blackhole route for 10.202.1.7 , if not try to configure and see if this one will fix the observed behaviour.
diag sys session filter src 10.103.248.55 <---- source IP
diag sys session filter dst 10.201.1.7 <---- destination IP
diag sys session list
More information for regarding a blackhole route you can find bellow :
Fortinet
Hi @syordanov
Thanks for your reply.
Currently i use hub and spoke with BGP and SDWAN enabled. The hub connect to 5 spoke and every spoke have ipsec tunnel also to the azure. Below my subnet :
With this condition where i should apply the blackhole?
Can i make blackhole with destination 10.0.0.0/8?
Dear @HS08,
On the Azure you can configure a blackhole route for the HUBs 10.100.0.0/16, and for the rest of the spokes 10.10x.0.0/16 , same need to be done every spoke and the HUB.
Yes, also is possible to configure 10.0.0.0/8 blackhole route .
Just before that change, please make sure that you have the scenario mentioned in my previous post -> IPSec is down, then traffic for 10.201.1.7 is routed via the default route.
Best regards,
Fortinet
hi @syordanov
Yes now if tunnel to azure down the traffic will be use default route (to interent).
Let me try to configure the black hole for every spoke and hub.
User | Count |
---|---|
2403 | |
1290 | |
778 | |
528 | |
454 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.