FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Atul_S
Staff
Staff
Article Id 345710
Description This article describes that is a critical component in managing the synchronization of routing and forwarding information across multiple processing units in a Chassis environment
Scope FortiGate-6k, 7k.
Solution

The chlbd daemon facilitates the synchronization of the FIB from the primary Forwarding Processor Module (FPM) to other secondary FPMs. This is essential for maintaining routing consistency across a distributed system.


By ensuring that all FPMs access the same routing information, the daemon enables effective load balancing of network traffic across the available forwarding resources. This optimizes performance and helps to prevent any single processor from becoming a bottleneck.


It also contributes to high availability in networking environments. If the primary FPM fails, the secondary FPMs can seamlessly take over forwarding responsibilities


The chlbd daemon typically operates independently of the routing protocols being used, focusing instead on the synchronization and load balancing of the FIB across various FPMs.

 

The below commands can be used to check this further:

 

systemctl status chlbd    <----- Check the status of the chlbd daemon.

 

In a situation where the Routing table is not synchronized between FPMs as the route-sync from master FPM and slave FPMs is handled by chlbd daemon, its best to restart the daemon as below:

 

diag test app chlbd 3     <----- To force route sync.

Contributors