Created on
11-24-2025
09:51 AM
Edited on
11-24-2025
09:54 AM
By
Stephen_G
| Description | This article describes the expected behaviour when flushing the secondary IPsec tunnel in the FGSP cluster. |
| Scope | FortiGate. |
| Solution |
When manually executing 'diagnose vpn ike gateway flush' on the secondary IPsec FGSP member, the tunnel is flushed in the primary member.
The following debug commands can be read with IKE debugging:
Secondary:
Primary:
2025-11-13 19:14:53.145451 ike 0:VPN-1-221_1: HA del IKE SA 8ba5f85506579855/9537361887e9df8c
This is by design: In FGSP, there is no fixed Primary or Secondary FortiGate. Any tunnel can operate on any member of the FGSP group at any given time. This means the Primary or Secondary role can switch very quickly. When a tunnel is flushed from one FortiGate, if another FortiGate still retains it, it would break the tunnel synchronization rules and create asynchronous tunnel records among FGSP members. Additionally, there can be multiple members in an FGSP group. If only the primary tunnel could accept the flush command, an administrator will need to locate the device currently holding the primary tunnel, log in, and flush it. If the primary tunnel switches, the admin will have to repeat the process, which is inefficient. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.