Created on
ā11-17-2022
10:33 AM
Edited on
ā09-17-2025
06:12 AM
By
Debbie_FTNT
Description | This article lists helpful debug commands to use for sslvpnd process that frequently crashes or consumes high CPU. |
Scope | FortiGate |
Solution |
Access FortiGate via the putty and log the putty session output. The following debugs are to be captured in both working and non-working states for comparison.
Either the FortiGate debug report or 'diagnose sys top' will show this. Run Time: 90 days, 9 hours and 30 minutes
These additional commands are used for isolating the cause for sslvpnd high memory usage or high CPU usage: fnsysctl date diagnose sys mpstat diagnose hardware sysinfo interrupt
diagnose vpn ssl debug-filter clear Using a script to run the below commands every 5-10 minutes:
diagnose debug enable diagnose vpn ssl stat
Once the data is captured at the time of the issue, restart the SSL VPN daemon by using the command 'diagnose sys kill 11 <PID>' (PID is the process ID of sslvpnd process), then run the 'diagnose debug crash read' command for the backtrace; there should be a new entry with for sslvpnd at the bottom.
Another thing to check is the amount of TCP SYN attempts to the SSL VPN port. If there are a lot of connection attempts to the SSL VPN port but not being successful, it can also result in high CPU caused by sslvpnd.
get vpn ssl monitor
If confirmed, try to change the SSL VPN port (temporarily) in an attempt to lower the high CPU usage caused by sslvpnd process.
Note:
Related article: Technical Tip: SSL VPN daemon consumes high CPU due to brute force attacks |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.