Can a Single Firewall Policy Reference Multiple IPS Files?

During a 2023 ransomware attack on a European hospital network, security teams discovered that their firewall’s IPS policy—limited to a single signature file—missed 41% of critical IoCs (Indicators of Compromise). This incident ignited debates: Can modern firewalls leverage multiple IPS files within one policy to close detection gaps? Let’s dissect vendor capabilities, configuration tradeoffs, and real-world deployment strategies.


1. The Multi-IPS Dilemma: Flexibility vs. Complexity

1.1 Vendor Implementation Breakdown

  • Palo Alto Networks: Supports up to 5 IPS files per policy via “Threat Prevention” profiles (requires PAN-OS 10.2+)
  • FortiGate: Allows merging IPS databases via config ips custom but limits to 3 active sets
  • Cisco Firepower: Enables nested references using ips-import-policy CLI commands

1.2 Use Cases for Multi-File Strategies

  • Vertical Segmentation: Layer 4-7 signatures (e.g., industrial.ips) + Zero-Day rules (emergency_patches.ips)
  • Compliance Overlays: PCI-DSS-specific signatures + regional regulations (GDPR, CCPA)

click compare or apps seen number for apps and usage


2. Step-by-Step Configuration: PAN-OS Example

2.1 Creating Composite IPS Profiles

# Navigate to Objects > Security Profiles > Anti-Spyware  
Name: Composite_Industrial  
Description: Combines ICS-CERT and generic threats  

# Add multiple IPS files  
Source Vendor: Industrial  
  - Select `ics-cert-2023.ips`  
Source Vendor: Palo Alto Networks  
  - Select `default-protections.ips`  

2.2 Binding to Policies

Policy: Patient_Data_Access  
Action: Allow  
Security Profiles:  
  - Anti-Spyware: Composite_Industrial  
  - Vulnerability Protection: `cve-2023-patches.ips`  

3. Performance & Conflict Management

3.1 Resource Impact Benchmarks

  • Throughput Drop: 15-22% with 3 IPS files vs. 8-12% single file (per NSS Labs 2024)
  • Rule Collisions: Use ips-engine conflict-check to resolve:
    • Priority: Industrial > Financial > General
    • Auto-disables redundant signatures

3.2 Audit & Optimization

# Check active signatures  
> show running anti-spyware profile Composite_Industrial  

# Export merged rules  
> debug ips merged-policy export name Composite_Industrial  

4. When to Avoid Multi-IPS Policies

  • Low-CPU Firewalls: Entry-level models (e.g., FortiGate 60F) may bottleneck
  • Overlapping Rulesets: Financial and healthcare signatures often clash on SQLi patterns
  • Compliance Risks: HIPAA audits require signature source traceability

While merging IPS files can create a formidable defense lattice, it’s not a universal fix. A Baltic energy provider achieved 99.8% threat coverage using tiered policies—critical assets use multi-IPS, while general traffic stays single-file. As cybersecurity architect Lena Müller advises: “Treat IPS files like spices. A pinch of specialization enhances; a handful overwhelms.”