Chapter 9 High Availability for FortiOS 5.0 : HA and load balancing : Load balancing overview : HTTPS sessions, active-active load balancing, and proxy servers
  
HTTPS sessions, active-active load balancing, and proxy servers
To prevent HTTPS web filtering problems active-active HA does not load balance HTTPS sessions. The FortiGate unit identifies HTTPS sessions as all sessions received on the HTTPS TCP port. The default HTTPS port is 443. You can use the CLI command config antivirus service to configure the FortiGate unit to use a custom port for HTTPS sessions. If you change the HTTPS port using this CLI command, the FGCP stops load balancing all sessions that use the custom HTTPS port.
Normally you would not change the HTTPS port. However, if your network uses a proxy server for HTTPS traffic you may have to use the config antivirus service command to configure your cluster to use a custom HTTPS port. If your network uses a proxy server you might also use the same port for both HTTP and HTTPS traffic. In this case you would use config antivirus service to configure the FortiGate unit to use custom ports for both HTTP and HTTPS traffic.
Using the same port for HTTP and HTTPS traffic can cause problems with active‑active clusters because active-active clusters always load balance HTTP traffic. If both HTTP and HTTPS use the same port, the active-active cluster cannot tell the difference between HTTP and HTTPS traffic and will load balance both HTTP and HTTPS traffic.
As mentioned above, load balancing HTTPS traffic may cause problems with HTTPS web filtering. To avoid this problem, you should configure your proxy server to use different ports for HTTP and HTTPS traffic. Then use the config antivirus service command to configure your cluster to also use different ports for HTTP and HTTPS.