Hi,
Anyone out there using FortiOS v7.4.4,build2662 on the FortiGate-60F? How is your RAM usage?
I've installed v7.4.4,build2662 a couple of weeks ago, and the device was entering conserve mode every few days or so. Usual RAM utilization was around 75%, right after boot, so no wonder it was pushing it into conserve mode.
I've since downgraded to 7.2 (now usual RAM usage i 60-65%) but with this version we're having other issues which I would love to resolve (long connection times, need to refresh a web page a few times to open it etc...).
Here is the info I got during the last conserve mode:
firewall01 get system status
Version: FortiGate-60F v7.4.4,build2662,240514 (GA.F)
First GA patch build date: 230509
Security Level: 2
Firmware Signature: certified
Virus-DB: 92.05717(2024-07-10 07:26)
Extended DB: 92.05717(2024-07-10 07:25)
AV AI/ML Model: 2.17065(2024-07-10 07:45)
IPS-DB: 28.00824(2024-07-10 00:15)
IPS-ETDB: 0.00000(2001-01-01 00:00)
APP-DB: 28.00823(2024-07-08 23:57)
FMWP-DB: 24.00070(2024-07-05 17:45)
IPS Malicious URL Database: 5.00107(2024-07-10 08:52)
IoT-Detect: 28.00824(2024-07-09 17:07)
OT-Detect-DB: 28.00824(2024-07-09 17:07)
OT-Patch-DB: 28.00824(2024-07-09 17:11)
OT-Threat-DB: 28.00823(2024-07-08 23:57)
IPS-Engine: 7.00539(2024-05-09 00:27)
Serial-Number: FGT60F*********
BIOS version: 05000030
System Part-Number: P24286-07
Log hard disk: Not available
Hostname: firewall01
Private Encryption: Disable
Operation Mode: NAT
Current virtual domain: root
Max number of virtual domains: 10
Virtual domains status: 1 in NAT mode, 0 in TP mode
Virtual domain configuration: disable
FIPS-CC mode: disable
Current HA mode: standalone
Branch point: 2662
Release Version Information: GA
System time: Wed Jul 10 18:32:42 2024
Last reboot reason: warm reboot
firewall01 diag sys top
[H[JRun Time: 0 days, 22 hours and 34 minutes
12U, 0N, 0S, 85I, 3WA, 0HI, 0SI, 0ST; 1917T, 301F
ipshelper 186 R < 99.9 9.0 6
quard 208 S 2.9 0.8 4
snmpd 197 S 0.4 0.6 0
node 169 S 0.0 4.1 6
ipsengine 346 S < 0.0 3.3 5
ipsengine 347 D < 0.0 3.3 7
ipsengine 348 S < 0.0 3.1 6
wad 298 S 0.0 2.6 2
forticron 174 S 0.0 2.3 2
wad 300 S 0.0 2.1 6
cmdbsvr 132 S 0.0 2.1 0
miglogd 183 S 0.0 2.0 0
cw_acd 221 S 0.0 1.8 1
forticron 3677 S 0.0 1.6 2
wad 190 S 0.0 1.5 5
forticron 3678 R 0.0 1.5 3
forticron 3676 S 0.0 1.5 4
sslvpnd 187 S 0.0 1.4 3
csfd 228 S 0.0 1.3 5
scanunitd 3645 S < 0.0 1.2 2
[H[JRun Time: 0 days, 22 hours and 34 minutes
2U, 0N, 1S, 73I, 24WA, 0HI, 0SI, 0ST; 1917T, 304F
ipshelper 186 D < 11.7 7.0 1
iked 192 S 2.9 0.9 4
ipsengine 348 S < 1.9 3.7 6
ipsengine 346 S < 1.3 3.8 5
ipsengine 347 S < 1.3 3.8 7
miglogd 306 S 0.3 1.3 0
urlfilter 290 S < 0.3 0.8 1
radvd 213 S 0.3 0.6 2
forticron 3678 R 0.1 1.5 3
sslvpnd 235 S 0.1 1.1 3
sslvpnd 236 S 0.1 1.1 1
authd 176 S 0.1 0.7 1
syslogd 194 S 0.1 0.7 1
dnsproxy 215 S 0.1 0.5 1
acd 200 S 0.1 0.4 7
merged_daemons 172 S 0.1 0.4 2
node 169 S 0.0 4.1 6
wad 298 S 0.0 2.6 2
forticron 174 S 0.0 2.3 2
wad 300 S 0.0 2.1 2
[H[JRun Time: 0 days, 22 hours and 34 minutes
10U, 0N, 0S, 87I, 3WA, 0HI, 0SI, 0ST; 1917T, 316F
ipshelper 186 R < 83.1 7.4 1
forticron 174 S 0.7 2.3 3
ipsengine 346 S < 0.5 3.9 5
ipsengine 347 S < 0.5 3.8 7
ipsengine 348 S < 0.1 3.8 6
cw_acd 221 S 0.1 1.8 0
sslvpnd 238 S 0.1 1.1 7
node 169 S 0.0 4.1 6
wad 298 S 0.0 2.6 2
wad 300 S 0.0 2.1 0
cmdbsvr 132 S 0.0 2.1 0
miglogd 183 S 0.0 2.1 5
forticron 3677 S 0.0 1.6 2
wad 190 S 0.0 1.5 6
forticron 3678 R 0.0 1.5 3
forticron 3676 S 0.0 1.5 4
sslvpnd 187 S 0.0 1.4 5
miglogd 306 S 0.0 1.3 2
csfd 228 S 0.0 1.3 5
scanunitd 3645 S < 0.0 1.2 2
[H[JRun Time: 0 days, 22 hours and 34 minutes
11U, 0N, 0S, 86I, 3WA, 0HI, 0SI, 0ST; 1917T, 330F
ipshelper 186 R < 94.8 7.4 2
ipsengine 348 D < 1.1 3.9 6
cw_acd 221 S 0.1 1.8 3
forticron 3678 R 0.1 1.5 3
sslvpnd 235 S 0.1 1.1 4
snmpd 197 S 0.1 0.6 3
node 169 S 0.0 4.1 7
ipsengine 346 S < 0.0 3.9 5
ipsengine 347 S < 0.0 3.8 7
wad 298 S 0.0 2.6 5
forticron 174 S 0.0 2.3 3
wad 300 S 0.0 2.1 5
miglogd 183 S 0.0 2.1 0
cmdbsvr 132 S 0.0 2.1 0
forticron 3677 S 0.0 1.6 2
wad 190 S 0.0 1.5 6
forticron 3676 S 0.0 1.5 4
sslvpnd 187 S 0.0 1.4 5
miglogd 306 S 0.0 1.3 3
csfd 228 S 0.0 1.3 6
NSE 7
All oppinions/statements written here are my own.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Good day @NotMine ,
- There could be several processes that causes the device to enter the conserve mode, but since the FortiGate is rebooted there should be nothing much in the logs as well. But you can create this automation stitch: https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-How-to-do-initial-troubleshooting-of... that triggers when the device enters the conserve mode. Or you can open up the TAC case to further investigate based on the logs collected from above stitch.
Hello, thank You for answering. Well, there is the crashlog with several 'conserve mode' messages in it, and we are also saving the logs on the FortiAnalyzer.
My guess/fear is that FOS 7.4 is simply 'too much' for these entry level devices, that is why I asked if anyone else is using it.
NSE 7
All oppinions/statements written here are my own.
Good afternoon, I have three FortiGate-60f and the same thing is happening to me with version 7.4.4 and 7.6.
OK, so, considering that Fortinet is removing a lot of "proxy" features from entry-level FortiGate devices in versions 7.4.4 and 7.6 - "as part of improvements to enhance performance and optimize memory usage on FortiGate models with 2 GB RAM or less", I assume they are very much aware of this problem. They just refuse to acknowledge it here, or anywhere else apparently.
Since we were experiencing "slow Internet" with version 7.2 on FGT-60F, I had to upgrade to 7.4.4. Now our "Internet" is very good, until the device enters the conserve mode and bugs out. Last night I had to drive to the office and manually restart it in order to get it back online. So I'll open a ticket and stay on it until they provide a viable solution for this problem.
NSE 7
All oppinions/statements written here are my own.
Hello @NotMine ,
Can you check this one: https://community.fortinet.com/t5/FortiGate/Troubleshooting-Tip-How-to-optimize-memory-usage-specifi... this addresses the low-end device issue and you can set those settings on your device and monitor it if it enters the conserve mode again or not.
Hi @NotMine
Try this: https://community.fortinet.com/t5/FortiGate/Technical-Tip-IPS-memory-optimization-steps/ta-p/197486
Thank you @dbhavsar and @amuda.
Yesterday I've implemented some of the changes recommended in KB @dbhavsar recommended and the device did NOT enter the conserve mode last night. Prior to the config changes, it would enter the conserve mode at least once a day, usually late afternoon. So, hopefully, these config changes helped.
I'll update the topic in the next few days with the result and exact config changes I've implemented.
Cheers!
NSE 7
All oppinions/statements written here are my own.
Unfortunately, after working fine for several days with the "optimize memory" configuration changes suggested here, the device went full retard. It simply stopped working and it would not boot after the restart. I had to format the boot device, reinstall the firmware from scratch and restore the configuration.
Now it goes to conserve mode every few days or so and I have to drive to the office and cold restart it. I did upgrade to 7.4.5 as soon as it was available.
This morning I've turned off as much of UTP scanning (AV especially) and logging in polices as I could, and I've also implemented some of the "memory optimization" tweaks. Hopefully, it will help.
Here are the config changes I've implemented (just for future reference):
config ips global
set engine-count 2
set socket-size 48
end
config log memory setting
set status disable
end
config system session-ttl
set default 600
end
config system dns
set dns-cache-limit 300
end
NSE 7
All oppinions/statements written here are my own.
After implementing the above changes, device is still entering conserve mode. Furthermore, two of the ports, connected to two separate network devices, are behaving strangely (flapping). HQIP passed, no hardware fault found. So i have a ticket opened, hoping for resolution.
NSE 7
All oppinions/statements written here are my own.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1732 | |
1106 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.