Description |
This article explains the issue of the devices with 4 GB RAM getting to conserve mode during the FortiGuard upgrade while IPS and application control are enabled on firewall policies. |
Scope |
FortiGate v7.6.1 with 4 GB RAM. |
Solution |
The issue is under investigation as a known issue ID 1076213.
The command below in FortiGate CLI will show the RAM:
FortiGate-100F # get hardware status Model name: FortiGate-100F ASIC version: SOC4 CPU: ARMv8 Number of CPUs: 8 RAM: 3614 MB
FortiGate-100F # get sys perf status Memory: 3701376k total, 3174480k used (85.8%), 312896k free (8.5%), 214000k freeable (5.7%)
logid="0100022815" type="event" subtype="system" level="notice" vd="root" logdesc="Scanunit loaded AV Database" action="update" msg="scanunit=manager pid=1204 loading AV database successful"
FortiGate-100F # diag sys top-all 2 100 Run Time: 0 days, 0 hours and 20 minutes 25U, 0N, 0S, 75I, 0WA, 0HI, 0SI, 0ST; 3614T, 643F ipshelper 263 R 99.9 3.5 4 wad_ips 1338 R 99.5 1.8 2 bcm.user 133 S < 2.9 0.5 1 newcli 1333 S 1.4 0.7 0
FortiGate-100F # diagnose sys top-mem 250 ipshelper (263): 369914kB wad_ips (1338): 195507kB
ipshelper is part of the IPS engine and wad_ips is WAD's ips/appctl database builder.
This issue is resolved in FortiGate v7.6.2 Firmware. The fix is scheduled for release in March 2025.
Workaround:
config ips settings set proxy-inline-ips disable end
Option:
config ips global set cp-accel-mode none end
Related article: Technical Tip: How conserve mode is triggered |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.