Troubleshooting Tip: HA out of sync issue due to 'vpn.certificate.local' object
Description
This article describes how to troubleshoot the HA out-of-sync issue due to the 'vpn.certificate.local' object with FortiGate.
Scope
All FortiGate versions.
Solution
This object 'vpn.certificate.local' holds all the local certificates present in the FortiGate. If a HA cluster goes out of sync due to the object 'vpn.certificate.local', it is necessary to check if the private-data-encryption is enabled or not under global settings.
- Check if the private-data-encryption is enabled or not using the commands below:
config system global
show full | grep private
Sample output:
FW1 # config system global
FW1 (global) # show full | grep private
set private-data-encryption enable <----- Enabled.
Related article:
Technical Tip: How to enable private-data-encryption feature on a standalone FortiGate
- Verify if the checksum of certificates is different or not under the object 'vpn.certificate.local' using the below command on the cluster units:
diagnose sys ha checksum show root vpn.certificate.local
- If the private-data-encryption is enabled and if the checksums of certificates are different, follow the steps below:
- Disable private-data-encryption:
execute ha synchronize start
diagnose sys ha checksum cluster <----- If the checksums are the same, proceed to step 4.
- If the private-data-encryption is disabled and if the checksums of certificates are different, follow the steps:
- Enable private-data-encryption:
execute ha synchronize start
diagnose sys ha checksum cluster <----- Make sure if the checksums are the same.
Note:
If the private data encryption is disabled.
show full | grep private
set private-data-encryption disable <---
- Perform a hard failover to the HA Cluster to resolve the issue.
- Run the command on the Primary FortiGate:
execute ha failover set 1
Caution: This command will trigger an HA failover.
It is intended for testing purposes.
Do you want to continue? (y/n)y
- To stop the failover, run the following command:
execute ha failover unset 1
- Run the commands below to recalculate the HA checksums:
diagnose sys ha checksum recalculate
diagnose sys ha checksum show global
get sys ha status
- If the problem persists, restart the following processes using the CLI commands below and reboot the secondary unit:
fnsysctl killall hatalk
fnsysctl killall hasync
Note:
Super Admin privilege is required to run the 'fnsysctl' command. Otherwise, FortiGate will return an error, as explained in this KB article: Troubleshooting Tip: fnsysctl command returns Unknown action.
