Created on
01-02-2023
10:37 PM
Edited on
08-25-2025
04:22 AM
By
Jean-Philippe_P
Description |
This article describes how to correct an out-of-sync HA cluster by modifying the primary unit configuration file and restoring it to the secondary unit.
The HA cluster is out of sync, which was confirmed by running the 'diagnose system ha checksum cluster' command.
Troubleshooting a checksum mismatch in a FortiGate HA cluster did not work.
Related article: Technical Tip: Troubleshooting a checksum mismatch in a FortiGate HA cluster
Drilling down in the CLI using the 'diagnose system ha checksum show <vdom> <config parameter>' command on both HA cluster members, the cluster still shows many configuration items out of sync. |
Scope |
FortiGate. |
Solution |
Instead of trying to correct each configuration item that is out of sync individually, which could be very time-consuming depending on the number of items out of sync, do the following:
config system global set hostname <hostname> <----- Hostname will be shown here. end
config system ha set priority <priority value> <----- The HA priority value will be shown here. end
This can be done by first verifying the interface being used for HA management by searching for the following commands in the configuration file.
config system ha config ha-mgmt-interface set interface <interface name> <----- The interface name will be shown here. end
Once the 'ha management interface' is known, it is then possible to change the IP by searching for the following commands in the configuration file.
config system interface edit <ha management interface name> set ip x.x.x.x <----- IP address and subnet will be shown here. end
Note: Restoring a global configuration backup causes the devices and any connected cluster members to reboot. If the secondary device was not correctly isolated from the cluster as described in Step 7, this will cause the primary to reboot as well. See the article Technical Tip: How to restore a configuration backup on a FortiGate HA cluster. After the secondary device has been rebooted, it will have the identical configuration file as the primary cluster member, plus any manual modifications. Note: If there is any error in the config file that has been imported, then the following command can be run to verify:
diagnose debug config-error-log read
Verify the secondary's configuration and connect the HA heartbeat cables. Wait two minutes and verify configuration sync. If the configuration is synchronized, reconnect the secondary's data/network-facing cables.
Note: If the HA Pair is still out of sync after restoring the identical configuration file to the secondary device, recalculate the checksum manually on both devices:
diagnose sys ha checksum recalculate diagnose sys ha checksum test
Or, more specifically:
diagnose sys ha checksum recalculate [vdom_name> | global]
Note: Use the keyword 'sys' after diagnose. The keyword 'system' is invalid and will result in an error in the CLI command.
If the configuration is still not in sync after following the steps above: Follow any troubleshooting steps from Technical Tip: Troubleshooting a checksum mismatch in a FortiGate HA cluster not completed previously, take a configuration backup of each device, and open a ticket with Fortinet Support under an existing support contract. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.