Created on
09-28-2023
11:34 PM
Edited on
11-26-2025
10:08 PM
By
Jean-Philippe_P
| Description | This article describes two FortiGate CLI commands related to IPS global configuration and explains their impact and use cases. |
| Scope | FortiGate. |
| Solution |
The FortiGate CLI commands below are valuable tools for configuring IPS global settings.
config ips global set database extended end
config ips global set exclude-signatures none end
Enabling the extended IPS database enhances threat detection capabilities, especially against emerging threats. Specifying 'none' for signature exclusions ensures comprehensive coverage and compliance with regulatory requirements.
config ips global
Note 1: Before v7.4.1, the OT signatures were included in Industrial Attack Definitions. Previously, the commands were:
config ips global set exclude-signatures {none | industrial} end
Note 2: The above commands can also be used for any missing Application Control signatures on FortiGate. For Instance, IEC.60870-5-104 signature can be visible under Application Control by configuring changes.
Command 1:
config ips global set database extended end
The 'set database extended' command affects the configuration of the IPS database on the FortiGate.
Command 2:
config ips global set exclude-signatures none end
The 'set exclude-signatures none' command impacts the IPS global configuration by specifying the exclusion of specific IPS signatures.
Note: Related articles: Troubleshooting Tip: Using the FortiOS policy based packet capture |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.