Description | This article describes the use of the IPS processes in FortiGate. |
Scope | FortiGate. |
Solution |
In FortiGate, the IPS (Intrusion Prevention System) processes are used to detect or block attacks/exploits/known vulnerabilities with signature-based defense. All flow based security inspection features like IPS, application control, flow based webfilter, flow based antivirus, etc is handled by the IPS engine workers. IPS engines are also handling the NGFW feature for policy based firewall rules (config firewall security-policy). And IPS engines are handling the DoS feature (config firewall DoS-policy / diagnose ips anomaly list).
There are three main processes within the IPS:
diagnose test app ipsmonitor 1 <- Will display basic information on ipsmonitor.
Note that ipshelper is always at index 0 in the IPS process.
The number of the engine depends on different models/hardware.
Index 1 will be the master IPS engine, which is responsible for:
They most likely will have higher CPU/Memory usage than the other IPS engine workers.
For the last point, it is possible to see the process having a significantly higher CPU usage (i.e., in the output of the command diagnose sys top). Investigate further with the following commands:
After, dump details about the process IDs:
diagnose sys process pstack <PID> <- Dump process userspace stack.
Note: Starting from FortiOS version 7.6.3, the IPS engine functionality enhanced to support the detection of industrial Ethernet protocols such as LLDP, GOOSE, EtherCAT, and PROFINET RT. The IPS sensor detects the ethernet protocols and device detection log ethernet devices at layer 2. For more information, see Support Ethernet layer protocols in the IPS engine. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.