Fortinet black logo

FortiGate-7000 Handbook

Replacing a failed FPM or FIM

Copy Link
Copy Doc ID 42931b88-172e-11ec-8c53-00505692583a:503584
Download PDF

Replacing a failed FPM or FIM

This section describes how to remove a failed FPM or FIM and replace it with a new one. The procedure is slightly different depending on if you are operating in HA mode with two chassis or just operating a standalone chassis.

Replacing a failed module in a standalone FortiGate-7000 chassis

  1. Power down the failed module by pressing the front panel power button.
  2. Remove the module from the chassis.
  3. Insert the replacement module. It should power up when inserted into the chassis if the chassis has power.
  4. The module's configuration is synchronized and its firmware is upgraded to match the firmware version on the primary module. The new module reboots.
  5. Confirm that the new module is running the correct firmware version either from the GUI or by using the get system status command.

    Manually update the module to the correct firmware version if required. You can do this by logging into the module and performing a firmware upgrade. See Firmware upgrades.

  6. Verify that the configuration has been synchronized.

    The following command output shows the sync status of the FIMs in a FortiGate-7000 chassis. The field in_sync=1 indicates that the configurations of the modules are synchronized.

    diagnose sys confsync status | grep in_sy
    FIM04E3E16000080, Slave, uptime=177426.45, priority=2, slot_id=1:2, idx=0, flag=0x0, in_sync=1
    FIM10E3E16000063, Master, uptime=177415.38, priority=1, slot_id=1:1, idx=1, flag=0x0, in_sync=1
    ...

    If in_sync is not equal to 1 or if a module is missing in the command output you can try restarting the modules in the chassis by entering execute reboot from any module CLI. If this does not solve the problem, contact Fortinet support.

Replacing a failed module in a FortiGate-7000 chassis in an HA cluster

  1. Power down the failed module by pressing the front panel power button.
  2. Remove the module from the chassis.
  3. Insert the replacement module. It should power up when inserted into the chassis if the chassis has power.
  4. The module's configuration is synchronized and its firmware is upgraded to match the configuration and firmware version on the primary module. The new module reboots.
  5. Confirm that the module is running the correct firmware version.

    Manually update the module to the correct version if required. You can do this by logging into the module and performing a firmware upgrade.

  6. Configure the new module for HA operation. For example:

    config system ha

    set mode a-p

    set chassis-id 1

    set hbdev m1 m2

    set hbdev-vlan-id 999

    set hbdev-second-vlan-id 990

    end

  7. Optionally configure the hostname:

    config system global

    set hostname <name>

    end

    The HA configuration and the hostname must be set manually because HA settings and the hostname is not synchronized.

  8. Verify that the configuration has been synchronized.

    The following command output shows the sync status of the FIMs in a FortiGate-7000 chassis. The field in_sync=1 indicates that the configurations of the modules are synchronized.

    diagnose sys confsync status | grep in_sy
    FIM04E3E16000080, Slave, uptime=177426.45, priority=2, slot_id=1:2, idx=0, flag=0x0, in_sync=1
    FIM10E3E16000063, Master, uptime=177415.38, priority=1, slot_id=1:1, idx=1, flag=0x0, in_sync=1

    If in_sync is not equal to 1 or if a module is missing in the command output you can try restarting the modules in the chassis by entering execute reboot from any module CLI. If this does not solve the problem, contact Fortinet support at https://support.fortinet.com.

Replacing a failed FPM or FIM

This section describes how to remove a failed FPM or FIM and replace it with a new one. The procedure is slightly different depending on if you are operating in HA mode with two chassis or just operating a standalone chassis.

Replacing a failed module in a standalone FortiGate-7000 chassis

  1. Power down the failed module by pressing the front panel power button.
  2. Remove the module from the chassis.
  3. Insert the replacement module. It should power up when inserted into the chassis if the chassis has power.
  4. The module's configuration is synchronized and its firmware is upgraded to match the firmware version on the primary module. The new module reboots.
  5. Confirm that the new module is running the correct firmware version either from the GUI or by using the get system status command.

    Manually update the module to the correct firmware version if required. You can do this by logging into the module and performing a firmware upgrade. See Firmware upgrades.

  6. Verify that the configuration has been synchronized.

    The following command output shows the sync status of the FIMs in a FortiGate-7000 chassis. The field in_sync=1 indicates that the configurations of the modules are synchronized.

    diagnose sys confsync status | grep in_sy
    FIM04E3E16000080, Slave, uptime=177426.45, priority=2, slot_id=1:2, idx=0, flag=0x0, in_sync=1
    FIM10E3E16000063, Master, uptime=177415.38, priority=1, slot_id=1:1, idx=1, flag=0x0, in_sync=1
    ...

    If in_sync is not equal to 1 or if a module is missing in the command output you can try restarting the modules in the chassis by entering execute reboot from any module CLI. If this does not solve the problem, contact Fortinet support.

Replacing a failed module in a FortiGate-7000 chassis in an HA cluster

  1. Power down the failed module by pressing the front panel power button.
  2. Remove the module from the chassis.
  3. Insert the replacement module. It should power up when inserted into the chassis if the chassis has power.
  4. The module's configuration is synchronized and its firmware is upgraded to match the configuration and firmware version on the primary module. The new module reboots.
  5. Confirm that the module is running the correct firmware version.

    Manually update the module to the correct version if required. You can do this by logging into the module and performing a firmware upgrade.

  6. Configure the new module for HA operation. For example:

    config system ha

    set mode a-p

    set chassis-id 1

    set hbdev m1 m2

    set hbdev-vlan-id 999

    set hbdev-second-vlan-id 990

    end

  7. Optionally configure the hostname:

    config system global

    set hostname <name>

    end

    The HA configuration and the hostname must be set manually because HA settings and the hostname is not synchronized.

  8. Verify that the configuration has been synchronized.

    The following command output shows the sync status of the FIMs in a FortiGate-7000 chassis. The field in_sync=1 indicates that the configurations of the modules are synchronized.

    diagnose sys confsync status | grep in_sy
    FIM04E3E16000080, Slave, uptime=177426.45, priority=2, slot_id=1:2, idx=0, flag=0x0, in_sync=1
    FIM10E3E16000063, Master, uptime=177415.38, priority=1, slot_id=1:1, idx=1, flag=0x0, in_sync=1

    If in_sync is not equal to 1 or if a module is missing in the command output you can try restarting the modules in the chassis by entering execute reboot from any module CLI. If this does not solve the problem, contact Fortinet support at https://support.fortinet.com.