Created on
08-23-2024
05:22 AM
Edited on
09-24-2025
07:28 AM
By
Jean-Philippe_P
| Description | This article describes how to resolve an issue where HA is showing as out of sync due to a mismatch in FMWP rules. |
| Scope | All FortiGates and all supported versions of FortiOS - NAT or transparent mode. |
| Solution |
HA will show as 'out of sync' when FMWP rules are present in one of the firewalls but not in the other.
In the primary rules as below:
config rule fmwp "HTTP.Chunk.Length.Invalid."
In the secondary device, there will be no rules.
config rule fmwp end
In the primary device, the version will be up to date. However, in the secondary, the version will be 0.
diagnose autoupdate versions | grep -A3 'FMWP'
FMWP Definitions:
FMWP Definitions
The reason for this is that either the device is in an air-gapped network or the scheduled update is disabled.
Execute the command 'execute update-now' to update the license, where the FMWP definition will get updated, and the FMWP rules will get updated in the missing firewall, and will show the device in sync.
diagnose debug application update -1 diagnose debug enable execute update-now
Troubleshooting commands:
diagnose autoupdate versions | grep -A3 FMWP
Manually force the HA synchronization using the commands below:
execute ha synchronize start
A simple recalculation of checksums might help. On the Primary unit:
diagnose sys ha checksum recalculate <-- Then check again if synchronized.
On backup units:
diagnose sys ha checksum recalculate <-- Then check again if synchronized. Note: If the cluster continues to stay out of sync, try failing over to the secondary unit and perform the same command again:
diagnose debug application update -1 diagnose debug enable execute update-now |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.