| Description |
This article describes a known issue that occurs with hardware-offloading when IPsec VPN tunnels are terminated/listening on NPU VDOM links (also known as npu_vlinks). This issue will also occur if the IPsec tunnel is listening on a VLAN sub-interface that is configured on top of an npu_vlink. |
| Scope | FortiGate, NPU Hardware-Acceleration, IPsec. |
| Solution |
When FortiGates are configured with Virtual Domains (VDOMs), it is common to utilize NPU VDOM links to interconnect the VDOMs, as it allows for traffic to be hardware-accelerated as it passes from one VDOM to another. Refer to the following KB article for more information on VDOM links in-general: Technical Tip: Difference and understanding between NPU Vdom link, NPU Vdom link with VLAN and Vdom ....
As part of this design, administrators may consider configuring their VPN tunnels to listen/terminate on these NPU VDOM links. The following is an example of what this topology might look like:
However, there is a known issue that occurs when IPsec VPN tunnels are configured to listen on NPU VDOM links or associated VLANs (for example, the issue would occur in the above topology if the VPN tunnel was set to listen on vlan100 in the root VDOM). In this configuration, the VPN tunnel will appear to be fully offloaded to the NPU, but in actuality, it will be handled entirely by the CPU.
Important Note: This issue specifically occurs due to an issue with how the NPU handles VPN tunnels using UDP-encapsulated ESP traffic (aka UESP and UDP/4500), and this situation only occurs when NAT-Traversal is utilized. However, configurations that utilize IPsec tunnels terminated on NPU VDOM links are generally assigning private IP addresses to the NPU VDOM link pairs, and so NAT-Traversal becomes a nearly-universal requirement.
The only way to avoid this issue would be to assign routable public IP addresses to the NPU VDOM links so NAT is not performed in-between the NPU VDOM link and the remote VPN peer.
With the above in mind, the following symptoms may be observed as a result:
At the time of this writing, this issue has been confirmed to occur for NP7 and NP6XLite (aka SOC4) equipped FortiGates, though it is likely that other NPU platforms (NP6lite, NP6, NP7lite) are affected. Additionally, given that this is a byproduct of the NPU hardware design, it cannot be corrected in software/firmware, and so the issue cannot be resolved for now.
Workaround: The current recommendation is to avoid FortiGate VDOM designs where VPN Tunnels are terminated on npu_vlink interfaces or VLANs associated with npu_vlinks. Consider some of these alternative designs that still allow for hardware-offload of IPsec traffic:
Additional Notes:
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.