Created on
01-05-2022
11:55 AM
Edited on
08-26-2025
07:23 AM
By
Jean-Philippe_P
Description |
This article describes the changes in the IPSec load-balance setting from v6.2.6/6.4.6 onwards.
IPSec load-balancing is enabled on FortiGate 6000 series and disabled on FortiGate 7000 series by default until v6.2.4/v6.4.2, and this config was part of the load-balance setting as below.
config load-balance setting set ipsec-load-balance {disable | enable} end
From v6.2.6/6.4.6, IPSec load balancing is tunnel-based. One can set the load balance strategy for each tunnel when configuring phase1-interface options:
config vpn ipsec phase1-interface edit <name> set ipsec-tunnel-slot {master | auto | FPM3 | FPM4 | FPM5 | FPM6} end
While upgrading to v6.2.6/6.4.6 from any older versions, the IPSec load-balance configuration is expected to migrate based on the user's setting. Users might run into upgrade issues when using v6.2.6 or v6.2.7, or v6.4.2 as an intermediate path while upgrading to higher versions. It is recommended to use v6.2.9 as an interim version. |
||||||||
Scope |
FortiGate 6000/7000 series, v6.2.6/6.4.6 onwards. |
||||||||
Solution |
Upgrade path: If a user is planning on upgrading to 6.4.6, use a 6.2.9 version as an intermediate path, and avoid using v6.4.2 as this version currently has a few known issues on IPsec load-balancing.
Reference: IPsec VPN load balancing changes.
To see the selected slot for IPSEC Load Balance, 'ike gateway list' or 'tunnel list name' commands can be used:
diagnose vpn ike gateway list name VPN_AWS | grep "IPSec LB"
The above example shows that FPC04 is used for IPsec Load Balance.
config load-balance flow-rule Special note on IPsec tunnel sourced from a virtual interface such as loopback/npu-link.
Case 1: If the user had an IPsec tunnel Load-balance disabled before the upgrade, the upgrade procedure will automatically set the tunnel to master. IPsec tunnel support on the virtual-interface should work fine if the ESP and UDP 4500 flow rules were already configured before the upgrade. But if there were no flow rules before the upgrade, then manually create those flow rules after the upgrade.
Case 2: If the user had IPsec tunnel Load-balance enabled before the upgrade, the upgrade procedure will automatically set the tunnel to auto. IPsec tunnel support on the virtual-interface should work fine if there was no flow-rule for ESP and UDP 4500 configured before the upgrade. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.