Created on
04-07-2022
05:37 AM
Edited on
11-25-2025
02:21 AM
By
Jean-Philippe_P
| Description | This article describes when Hardware Acceleration for IPsec is configured on the Loopback interface. |
| Scope | FortiGate. |
| Solution |
For FortiGates with NP6 or NP6lite and NP7 (FortiOS up to v7.0.5 or v7.2.0), when IPsec VPN is configured with the source interface as a Loopback interface, this may lead to performance issues as the loopback interface does not support hardware acceleration. It is recommended to configure IPsec to use a Physical interface.
For devices with NP7 running on FortiOS v7.0.6 and v7.2.1 and above, hardware acceleration is supported on Loopback interfaces.
In order to verify such a configuration in the unit, issue the command 'diagnose vpn tunnel list' and identify the tunnel.
For easier reading, a sample omitted output will be generated:
name=to10.183.4.123 ver=2 serial=1 172.16.1.1:0->10.183.4.123:0 tun_id=10.183.4.123 tun_id6=::10.183.4.123 dst_mtu=0 dpd-link=on weight=1
Two key factors should be noted:
In FortiOS v5.4.0 and later, the fields dec_npuid=x and enc_npuid=y indicate which NP6 processor holds the inbound and outbound IPsec Security Associations:
dec_npuid --> NP6 chip where the inbound SA (SA-dec) is installed. enc_npuid --> NP6 chip where the outbound SA (SA-enc) is installed.
Example:
(dec|enc)_npuid = 0 → The corresponding SA (dec or enc) is not offloaded to NP6 hardware. (dec|enc)_npuid = x → The SA is offloaded to NP6 chip number x, where NP6 numbering starts at np6_(x-1).
Example:
enc_npuid = 2 → outbound SA is on np6_1. dec_npuid = enc_npuid = 2 → Both inbound and outbound SAs are offloaded to the second NP6 chip, which is np6_1. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.