| Description | This article explains an issue where administrator accounts are unexpectedly logged out of a remote FortiGate device when accessing it through a local FortiGate using SD-WAN WAN links. | 
| Scope | 
 FortiGate.  | 
| Solution | 
 Symptoms: The situation arises due to FortiGate login violations caused by multiple source IPs attempting to access the same HTTPS administrative interface. 
 This typically occurs when SD-WAN rules allow session traffic to traverse multiple uplinks, resulting in session stickiness problems and forced logouts. The article provides a step-by-step guide for tracing the issue, configuring source-IP stickiness, and enhancing management security by restricting admin access to designated source IPs. 
 
 Logs may indicate that the source IP for management traffic is changing or not persistent throughout the session. 
 Root Cause: When SD-WAN is configured for load balancing or lacks session persistence, administrative traffic from a local FortiGate to a remote FortiGate may egress from different WAN interfaces, causing the source IP address to change. FortiGate’s admin sessions are tightly bound to the source IP. If the source IP changes during the session, the remote FortiGate considers it a violation and logs out the admin user for security reasons. 
 Solution: To address this issue, follow the steps below: 
 
 
 diagnose debug reset 
 After initiating and replicating the issue, disable debug with: 
 
 
 
 Related documents:  | 
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.