| Description | This article describes the cause and resolution of CPU spikes observed on FortiGate devices when a remote access VPN (RA VPN) user connects or disconnects. These spikes can affect traffic processing, cause traffic drops, and impact routing protocols such as BGP and OSPF. |
| Scope | FortiGate. |
| Solution |
Remote VPN tunnel connect/disconnect events with high concurrent sessions (13–15M) and CPS (80k–125k). Throughput = 20 Gbps.
Symptoms:
Debug/Log Commands:
date=2025-11-19 time=15:11:17 id=7530279732491845829 itime="2025-07-23 15:11:17" euid=3 epid=3 dsteuid=3 dstepid=3 logver=702101706 logid=0103020300 type="event" subtype="router" level="warning" msg="BGP: %BGP-5-ADJCHANGE: VRF 0 neighbor 172.30.1.21 NOT UP Hold Timer Expired" logdesc="BGP neighbor status changed" eventtime=1753279878044067216 tz="+0100" devid="FG3" vd="root" dtime="2025-07-23 15:11:17" itime_t=1753279877 devname="Test"
CPU32 states: 0% user 0% system 0% nice 18% idle 0% iowait 0% irq 82% softirq
misc info: session_count=13,382,741 setup_rate=139,977 exp_count=27 clash=277,619,980 System time: Wed Jul 23 15:11:13 2025 misc info: session_count=12,759,597 setup_rate=194,455 exp_count=28 clash=277,629,244 <<<< 600k sessions removed A large number of sessions were removed/added during VPN connect/disconnect. The NPU session count drops/increases indicate slow path processing impacting the CPU. System FIB version increments during this period.
Event Logs Indicating VPN Activity:
Workaround:
Long Term Solution: Update FortiOS to v7.4.10. Description: Fix prevents the last ACK packet from entering the slow path when a VPN tunnel is established/torn down, reducing CPU usage by 20–30%. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.