| Description | This article describes how the BGP neighborship established over the primary VPN tunnel remains active even when the primary tunnel goes down, and the backup tunnel is activated. |
| Scope | FortiGate v7.0.X, v7.2.X, v7.4.X. |
| Solution |
When the primary Internet 'wan1' is shut down on one of the Spoke FortiGates, both HUB and Spoke FortiGates advertise their respective tunnel IPs during IKE negotiation as shown below.
To collect and filter the IKE debugs, refer to this article: Troubleshooting Tip: IPSEC Tunnel (debugging IKE).
IKE Debugs:
However, the BGP neighborship on the backup VPN tunnel does not get established with the Hub(10.10.100.1) using its Tunnel IP (10.10.100.202). On HUB:
The route for the primary tunnel on the Spoke FortiGate remains UP in the kernel routing table even though the primary tunnel is down.
SPOKE# get router info kernel Starting with v7.x, the kernel always maintains the tunnel interface status as 'up', even when the tunnel is down, and the IP address remains in the routing table and kernel.
This issue has been resolved in v7.0.16, v7.2.11, 7.4.5, and v7.6.1, after which FortiGate will use the correct source IP address for subsequent BGP connections.
However, keep in mind that with the default settings, the original BGP peering will need to expire first before a new peering can be established using the IP address of the secondary tunnel. To force the original BGP peering to go down when the primary tunnel goes down (thus speeding up the transition to the new BGP peering with the secondary tunnel address), consider enabling the BGP link-down-failover option (see: Technical Tip: Understanding the link-down-failover, fast-external-failover, and interface options f...). |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.