Created on
‎03-17-2024
04:46 PM
Edited on
‎01-14-2026
01:15 PM
By
Jean-Philippe_P
| Description |
This article describes how to optimize memory to reduce the memory consumption for FGR-60F FortiGates in the second, third, and fourth generations. This configuration only applies to specific FortiGate models. |
| Scope | This issue can occur on any FortiGate model with 2 GB of RAM or less, such as the 30D, 30E, 30G, 40C, 40F, 50E, 50G, 60D, 60E, 60F, 70D, 80C, 80D, 80E, 90D, and 90E series of devices, including variants such as FortiWiFi, Rugged, 3G/4G, DSL, SFP, and POE, as long as the RAM is 2 GB or less. |
| Solution |
The following are some configuration adjustments to reduce and optimize memory usage when low-end models with UTM have high memory usage.
Increase memory-use-threshold:
config system global
Or schedule an update at off-peak time. For example:
config system autoupdate schedule
Or reduce worker count. The following configuration should be implemented during a maintenance window and carefully monitored during production hours for any performance impact.
For example, if the device is handling around 100-200 Mbps of traffic (as shown in the output of 'get system performance status' under average network usage), allocating more than one WAD worker or IPS engine may be necessary. This should be done while ensuring efficient memory utilization so that the device does not enter conserve mode.
config system global set miglogd-children 1 set sslvpn-max-worker-count 1 set wad-worker-count 1 set scanunit-count 2 end
The IPS process count can be configured:
config ips global
Reduce session-TTL to improve session recycling efficiency:
Reduce dns-cache:
config system dns
Disabled the security rating submission:
config system global set security-rating-result-submission disable <----- Starting from FortiOS version 7.2.0, the command is deprecated and no longer available.
Reduce internet-service-database:
set internet-service-database on-demand end
execute update-ffdb-on-demand
Note 1: Consider that these low-end models have only 2GB of RAM. It is therefore very likely that this device will enter conserve mode quickly if there are many sessions in progress for FortiGate.
Note 2: On v7.6.3, further optimizations were done, which remove or rework certain features on devices with 2GB or less of memory. For further details, consult Optimizations for physical FortiGate devices with 2 GB RAM 7.6.3.
Note 3: On v7.6.4, the default setting of cp-accel-mode is changed to none on 2GB memory models. This change disables CP acceleration to lower system memory usage, which can prevent some unexpected behavior due to a lack of memory. For further details, check this document: Default setting of cp-accel-mode is changed to none on 2GB memory models.
Technical Tip: Free up memory to avoid conserve mode Technical Tip: How to optimize memory consumption for smaller FortiGates Technical Tip: Memory Optimization Script for FortiGate Desktop Devices |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2026 Fortinet, Inc. All Rights Reserved.