| Description | This article describes the behavior of the TACACS packet on FortiGate HA Cluster depending on the ha-direct option. |
| Scope | FortiGate HA Cluster. |
| Solution |
When 'ha-direct is enabled, each FortiGate unit will initiate the TACACS connection from the ha-reserved management interface.
Cameron-kvm31 # show system ha
Cameron-kvm31 # show user tacacs+
These are the packet capture outputs when both units are initiating TACACS communication.
Primary:
Cameron-kvm31 # diagnose sniffer packet any "port 49" 4
Secondary
Iriz-kvm08 # diagnose sniffer packet any "port 49" 4
Because in an HA Cluster, the Secondary unit will not have any routing capabilities and it will use the normal routing table for the outgoing connection.
Cameron-kvm31 # get router info routing-table details 10.122.2.141 Routing table for VRF=0
Primary:
Cameron-kvm31 # diagnose sniffer packet any "port 49" 4 13.072466 port1 out 10.47.4.167.7026 -> 10.122.2.141.49: syn 532792360
Secondary:
Iriz-kvm08 # diagnose sniffer packet any "port 49" 4
While in the Secondary unit, the packet capture is empty, as expected.
Related article : Troubleshooting Tip: TACACS requests going through the HA management interface |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.