Whenever a packet arrives at one of the interfaces on a FortiGate, the FortiGate determines whether the packet was received on a legitimate interface by doing a reverse look-up using the source IP address in the packet header. This protects against IP spoofing attacks. If the FortiGate does not have a route to the source IP address through the interface on which the packet was received, the FortiGate drops the packet as per Reverse Path Forwarding (RPF) check. (page 433 FortiOS Administrator Guide)
Study guide 7.4 Page 86
"FortiGate performs an RPF check only on the first packet of a new session. That is, after the first packet passes the RPF check and FortiGate accepts the session, FortiGate doesn’t perform any additional RPF checks on that session."
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
wsdeffwd
Highly Voted 4 months agowsdeffwd
Highly Voted 4 months agohecjoseroag
Most Recent 4 weeks agosxcap
1 month agoevdw
1 month, 3 weeks agoJRKhan
1 month, 3 weeks agos4mu3l007
2 months, 1 week agofelixliao
2 months, 1 week agomarcovinicius4
2 months, 1 week ago3101a6a
2 months, 3 weeks agoShrekAlmighty
4 months agoThomasG7
2 months ago