Created on
04-10-2025
03:41 AM
Edited on
11-25-2025
10:42 PM
By
Jean-Philippe_P
| Description | This article provides insights into diagnosing and resolving issues related to HA synchronization, particularly when the primary unit fails to display the correct IP address. |
| Scope | FortiGate-VM AWS. |
| Solution |
To diagnose issues with the FortiGate AWS daemon (awsd) and HA status, execute the following CLI commands on the primary unit: diagnose debug application awsd -1 diagnose debug enable diagnose test application awsd 4 These commands will help identify if the 'awsd' process is correctly obtaining HA peer instance information and instance ENI details. AWS-HA-Active # HA state: primary
Use the command 'get sys ha status' to verify the HA status. However, note that it may not display the primary IP address correctly, showing 'my_ip=0.0.0.0' in the unicast heartbeat.
AWS-HA-Active # get sys ha status
An issue may arise if the FortiGate HA sync port (for example, port3) unexpectedly changes its IP address. To prevent such issues, it is advisable to use static IP address assignments on FortiGate-VM interfaces instead of relying on DHCP. This ensures consistent IP addressing, which is critical for maintaining HA synchronization.
Make sure the FortiGate is resolving the AWS service URLs. Additionally, ensure that both the primary and secondary FortiGate instances have an attached IAM role with the required permissions to make EC2 API calls, as missing permissions will prevent awsd from gathering peer and ENI information.
Connecting to the FortiGate-VM Deploying FortiGate-VM active-passive HA AWS between multiple zones |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.