| Description | This article describes the reason for CPU core Spikes after a configuration change and how to manage undesirable side effects in a high-level FortiGate with a huge number of firewall policies. |
| Scope | FortiGate and FortiProxy. |
| Solution |
For each FortiGate/FortiProxy model, there are limits for the maximum number of objects, for example, the number of firewall policies.
Making the example of a FortiGate 4200F, the maximum number of configurable firewall policies is 400 000, but already when a couple of tens of thousands of firewall policies, for example more than 20 000, are configured, can be observed CPU's cores spikes, after a configuration change.
Here is an example of CPU core spikes in a FortiGate, during the first seconds after a firewall policy is enabled:
FGT-4200F-01 (global)# diagnose sys top 5 10 3
With spikes on cores: 0, 6, 8, and 79.
This behavior can be observed in high-level FortiGates, with tens of thousands of firewall policies configured.
cmdbsvr_iprope and cmdbsvr_cfgsave are the daemons managing the unit configuration, and for each change, they also need to check the consistency of the rest of the configuration, so for them, spikes are expected.
The reason for the spikes in activity of daemons wad (which manage traffic proxing) and iked (which manages all VPN IPSec tunnels), is caused by their need to handle two activities after each configuration change:
Regarding the second one, the time to perform this activity can be reduced by instructing the FortiGate to check only the new connections, as explained here: Technical Tip: Information about firewall-session-dirty.
This default behavior change of FortiGate must be carefully evaluated, because using the check-new option, if a firewall policy is urgently added or modified to block previously allowed malicious traffic, FortiGate will not deny/drop that traffic until the existing session that permits it expires.
The wad peaks can be observed also in FortiProxy, and CPU spikes can be observed also in other daemons like the voipd daemon. Duration of spikes depends on multiple factors:
And others should last between 15 seconds to a couple of minutes.
Regarding point 3, the most recent ones contain several enhancements:
The wad, iked, and voips peaks can cause different issues like:
Another side effect is that in case of push from the FortiManager to the FortiGate of a massively firewall address renames (with tens of thousands of firewall policies using them), the activity can become extremely slow, because additionally to the configuration update the cmdb demons need to find and update each object reference.
Doing that activity with a FortiGate running FortiOS 7.4.9 GA, 7.6.5 GA or newer, the process is still long, but it requires less time since the FortiGate benefits from the fixes mentioned above.
In the case of FortiGates in High Availability (FGCP Cluster), peaks are observed in all cluster members, but for a longer period and involving additional daemons beyond cmdb and HA daemons, only in the primary unit.
Here is a list of precautions to mitigate this issue:
Related documents: Troubleshooting Tip: WAD CPU spikes due to configuration changes Maximum number of objects configurable for each FortiGate model: Fortinet Max Value Table and Technical Tip: FortiGate maximum values table. For more information on how the command 'diagnose sys top' works, see Technical Tip: Using the diagnose sys top CLI command. Activities performed by the most important FortiGate daemons: Technical Tip: Short list of processes on the FortiGate. How to check the FortiGate firewall policies table: Technical Tip: iprope policies group. High CPU Troubleshooting guide: Troubleshooting Tip: How high CPU usage should be investigated, and Technical Tip: VoIP and SIP configuration and troubleshooting resource lists. What is meant by the term ‘ga version’: Technical Tip: FortiOS firmware version terminology. What is a mature release: Firmware maturity levels Here is more info regarding session timeouts: Technical Tip: Default session timeout value (session-ttl). |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.