During a 2023 ransomware attack on a European hospital network, security teams discovered that their firewall’s IPS policy—limited to a single signature file—missed 41% of critical IoCs (Indicators of Compromise). This incident ignited debates: Can modern firewalls leverage multiple IPS files within one policy to close detection gaps? Let’s dissect vendor capabilities, configuration tradeoffs, and real-world deployment strategies.
1. The Multi-IPS Dilemma: Flexibility vs. Complexity
1.1 Vendor Implementation Breakdown
- Palo Alto Networks: Supports up to 5 IPS files per policy via “Threat Prevention” profiles (requires PAN-OS 10.2+)
- FortiGate: Allows merging IPS databases via
config ips custombut limits to 3 active sets - Cisco Firepower: Enables nested references using
ips-import-policyCLI commands
1.2 Use Cases for Multi-File Strategies
- Vertical Segmentation: Layer 4-7 signatures (e.g.,
industrial.ips) + Zero-Day rules (emergency_patches.ips) - Compliance Overlays: PCI-DSS-specific signatures + regional regulations (GDPR, CCPA)

2. Step-by-Step Configuration: PAN-OS Example
2.1 Creating Composite IPS Profiles
# Navigate to Objects > Security Profiles > Anti-Spyware
Name: Composite_Industrial
Description: Combines ICS-CERT and generic threats
# Add multiple IPS files
Source Vendor: Industrial
- Select `ics-cert-2023.ips`
Source Vendor: Palo Alto Networks
- Select `default-protections.ips`
2.2 Binding to Policies
Policy: Patient_Data_Access
Action: Allow
Security Profiles:
- Anti-Spyware: Composite_Industrial
- Vulnerability Protection: `cve-2023-patches.ips`
3. Performance & Conflict Management
3.1 Resource Impact Benchmarks
- Throughput Drop: 15-22% with 3 IPS files vs. 8-12% single file (per NSS Labs 2024)
- Rule Collisions: Use
ips-engine conflict-checkto resolve:- Priority: Industrial > Financial > General
- Auto-disables redundant signatures
3.2 Audit & Optimization
# Check active signatures
> show running anti-spyware profile Composite_Industrial
# Export merged rules
> debug ips merged-policy export name Composite_Industrial
4. When to Avoid Multi-IPS Policies
- Low-CPU Firewalls: Entry-level models (e.g., FortiGate 60F) may bottleneck
- Overlapping Rulesets: Financial and healthcare signatures often clash on SQLi patterns
- Compliance Risks: HIPAA audits require signature source traceability
While merging IPS files can create a formidable defense lattice, it’s not a universal fix. A Baltic energy provider achieved 99.8% threat coverage using tiered policies—critical assets use multi-IPS, while general traffic stays single-file. As cybersecurity architect Lena Müller advises: “Treat IPS files like spices. A pinch of specialization enhances; a handful overwhelms.”
Leave a comment