Created on
10-10-2025
09:54 AM
Edited on
10-13-2025
01:24 AM
By
Jean-Philippe_P
Description | This article describes the reason of CPU's cores Spikes after a configuration change and how to manage undesirable side effects, in a High Level FortiGate with a huge number of firewall policies |
Scope | FortiGate and FortiProxy |
Solution |
For each FortiGate/FortiProxy model there are limits for the maximum numbers of objects, for example the number of firewall policies.
Making the example of a FortiGate 4200F, the maximum number of configurable firewall policies is 400 000, but already when a couple of tens of thousands of firewall policies, for example more than 20 000, are configured, can be observed CPU's cores spikes, after a configuration change.
Here an example of CPU’s cores spikes in a FortiGate, during the first seconds after a firewall policy enable:
FGT-4200F-01 (global)# diagnose sys top 5 10 3
With spikes on cores: 0, 6, 8 and 79.
This behavior can be observed in High level FortiGates, with different tens of thousands of firewall policies configured.
cmdbsvr_iprope and cmdbsvr_cfgsave are the daemons managing the unit configuration and for each change they need also to check the consistency of the rest of the configuration, so for them spikes are expected.
The reason of spikes of wad (manage traffic proxing) and iked (manage all VPN IPSec tunnels), is that they need to read the new configuration to check if a change require to negate or permit a new or a existing flow of packets and to perform the 2 activities they need need to read the new configuration and update the sessions table.
Spikes can be observed also in other daemons and of course wad peaks can be observed also in FortiProxy.
Duration of spikes depends on multiple factors:
and others, should last between 15 seconds to a couple minutes.
Duration depend also from the firmware release running, being available improvements in newest:
The wad and the iked peaks can cause different issues like:
In case of FortiGates in High Availability (FGCP Cluster), peaks are observed in all cluster members, but for a longer period and involving additional daemons beyond cmdb and HA daemons, only into the primary unit.
Here is a list of precautions to mitigate this issue:
Correlated docs and articles:
Troubleshooting Tip: WAD CPU spikes due to configuration changes.
Maximum number of objects configurable for each FortiGate model: Fortinet Max Value Table and Technical Tip: FortiGate maximum values table.
For more information on how the command 'diagnose sys top' works, see Technical Tip: Using the diagnose sys top CLI command.
Activities performed by the most important FortiGate’s daemons: Technical Tip: Short list of processes on the FortiGate.
High CPU Troubleshooting guide: Troubleshooting Tip: How high CPU usage should be investigated. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.