Whenever a packet arrives at one of the interfaces on a FortiGate, the FortiGate determines whether the packet was received on a legitimate interface by doing a reverse look-up using the source IP address in the packet header. This protects against IP spoofing attacks. If the FortiGate does not have a route to the source IP address through the interface on which the packet was received, the FortiGate drops the packet as per Reverse Path Forwarding (RPF) check. (page 433 FortiOS Administrator Guide)
Study guide 7.4 Page 86
"FortiGate performs an RPF check only on the first packet of a new session. That is, after the first packet passes the RPF check and FortiGate accepts the session, FortiGate doesn’t perform any additional RPF checks on that session."
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
wsdeffwd
Highly Voted 7 months, 1 week agowsdeffwd
Highly Voted 7 months, 1 week agowryz
Most Recent 4 weeks agohecjoseroag
4 months, 1 week agosxcap
4 months, 2 weeks agoevdw
5 months agoJRKhan
5 months agos4mu3l007
5 months, 2 weeks agofelixliao
5 months, 2 weeks agomarcovinicius4
5 months, 2 weeks ago3101a6a
5 months, 4 weeks agoShrekAlmighty
7 months, 2 weeks agoThomasG7
5 months, 1 week ago