Description | This article describes the factors that lead to FortiGate entering Conserve Mode during scheduled or manual FortiGuard updates. |
Scope | FortiGate. |
Solution |
'desktop-tier FortiGates' will have baseline memory usage levels at 64-72% or higher (especially when security inspection is being utilized), and so they can easily trigger memory conserve mode during FortiGuard updates. This is especially true for models such as the FortiGate-30E, 40F, 60E, and 60F (i.e., units with less than or equal to 2GB of RAM). Refer to the Form Factor field in the product datasheet to identify the hardware type/form factor.
During the FortiGuard update process, it is possible to see system memory consumption increase by as much as 10-20%, and this can easily result in conserve mode being triggered (the default trigger entry threshold is 88% memory usage). Instances of conserve mode are especially evident during the following stages:
Part of this increased memory consumption during updates has been due to the various FortiGuard databases increasing in size over time as they are expanded upon (i.e., added IP addresses, expanded signature lists, etc.). For example, updates implemented in October 2023 resulted in the size of the Internet Service DB increasing by about 30%, and this has inadvertently elevated the risk of FortiGates entering conserve mode during updates, particularly on FortiGates already experiencing high baseline memory consumption.
General Notes:
Recommended Changes to reduce the risk of triggering Conserve Mode during FortiGuard updates:
Configure the FortiGuard update schedule to take place during non-production hours. FortiGuard databases are increasing in size over time as they are improved, and so it can be a good idea to perform Internet Service DB updates outside of business hours for all FortiGate models (desktop, campus, and datacenter-tier) since baseline memory usage is typically lower at that time. Setting updates to occur once-daily outside of business hours can be a good starting point, but is not the only option. The following example sets the update schedule to occur once weekly between 3-4 AM on Sundays:
config system autoupdate schedule
Low-end platforms like 60x, 40x are known for memory problems, since these devices are installed with low memory. During FortiGuard updates, these devices may suffer from conserve mode due to a lack of memory.
In order to avoid conserving mode, the number of workers can be reduced, since every worker comes with a certain memory overhead attached to it. The following configuration should be implemented during a maintenance window and carefully monitored during production hours for any performance impact. For guidance on configuring the engine count, refer to the NOTE in the article Technical Tip: Optimizing Memory Usage by Limiting Spawned Daemons
Security Ratings:
config system global
In Global config, check if the command 'set gui-proxy-inspection enable' is present. If any proxy features are not being used, it is recommended to disable this, because WAD will allocate memory resources if this command is enabled, even when the proxy is not being used.
Disable IPS Acceleration (aka set cp-accel-mode none), especially on FortiGates with <= 2GB of RAM. During a FortiGuard update, the ipshelper process can consume as much as 20% of available system memory on desktop FortiGates for 5-10 seconds, and so it is a leading cause of conserve-mode during FortiGuard updates. This memory demand occurs when the IPS signature database is updated, as the ipshelper process needs to recompile the database before uploading it to the onboard Content Processor (CP).
To disable this feature (and thus prevent this memory consumption from occurring), use the following CLI commands:
config ips global set cp-accel-mode none end
In previous iterations of this article, this option was only a suggestion. It is now highly recommended to implement this for FortiGates with <= 2GB RAM, such as the FortiGate 40F/41F and 60F/61F, and in fact, it is now the default behavior as of FortiOS v7.6 (see: FortiOS v7.6 Release Notes). The following KB article discusses the cp-accel-mode option in greater depth: Troubleshooting Tip: Conserve mode due to ipshelper in lower end models.
Modify the Internet Service database (FFDB) updates to the mini or on-demand versions (v7.2.4 and above) or disable updates to the FFDB.
config system global
In earlier versions, the alternative option is to use the mini version of the Internet Service database, which reduces the number of available services to the most common selection (thus reducing the size of updates):
config system global
Updates for the Internet Service database can be fully disabled if required.
config system fortiguard
For more information, refer to the following KB article regarding the Internet Service database: Technical Tip: Internet-service-database: On-demand.
To check which version of the database, run the following command:
diagnose autoupdate version
Additional Optimization: The above changes will make the largest difference for reducing/preventing conserve-mode caused by FortiGuard updates.
For additional optimization suggestions, refer to the following KB articles: Technical Tip: Steps on how to optimize Memory consumption Technical Tip: Free up memory to avoid conserve mode
Note: From v7.6.3, to enhance the stability of physical FortiGate devices with 2 GB RAM, the Security Rating feature and Security Fabric topology visibility have been removed. 2 GB RAM FortiGate models no longer support Security Rating and Security Fabric topology
Related articles: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.