| Description | This article describes an issue where LACP interfaces intermittently flap on Cisco Nexus switches, but the flaps are not detected or logged by the FortiGate. |
| Scope | FortiGate. |
| Solution |
The issue occurs in environments using LAG interfaces between FortiGate in HA and Cisco Nexus configured in vPC pairs. During the events, the Cisco side reports interfaces going down and up for 3 seconds, while the FortiGate side continues to show link status as up with no recorded log entries or system events.
On Cisco Nexus:
2025 Jan 14 10:21:01 %ETHPORT-5-IF_DOWN_INITIALIZING: Interface Ethernet1/25 (...) is down (Initializing)
On FortiGate:
Switch error counters:
rx_over_err :263500
Under heavy load, LACPDU frames may experience delayed or dropped handling in NP7 if the NP queue prioritization or message queue mode is not properly configured.
Two contributing factors are identified:
As a result, FortiGate fails to process incoming LACPDU frames in time, while the Cisco Nexus peer interprets the delay as a link loss and triggers a port-channel reinitialization (flap).
Workaround 1: Enable a Dedicated Message Queue.
Allocate a dedicated queue to improve reliability of LACP frame processing:
config system npu
Workaround 2: Restore Default NP-Queue Configuration.
Ensure that LACP EtherType 8809 is prioritized.
config system npu
Next step:
config system npu
Upgrade to v7.4.x for long term stability. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.