index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
2,055 | Security Profiles
config firewall ssl-ssh-profile
edit "protocols"
config ssh
set ports 22
set status deep-inspection
end
next
end
4. Configure the firewall policy:
config firewall policy
edit 1
set name "ICAP"
set srcintf "lan"
set dstintf "mgmt"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "alwa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,056 | Security Profiles
Where:
l X-Client-IP = the client sending the file
l X-Server-IP = the server receiving the file
l Tue Sep 20 04:01:50 UTC 2022 = the content of the file, which is in clear text after the FortiGate
performs deep inspection
b. The ICAP server response that the file is cleared and allowed to pass withou... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,057 | Security Profiles
2. Configure the ICAP profile:
config icap profile
edit "Prop-Content-Filtration"
set request enable
set response enable
set streaming-content-bypass enable
set request-server "content-filtration-server4"
set response-server "content-filtration-server4"
set request-path "/proprietary_code/content-filt... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,058 | Security Profiles
To configure the LDAP authentication:
1. Configure the LDAP server:
config user ldap
edit "AD-ldap"
set server "10.1.100.131"
set cnid "cn"
set dn "dc=fortinet-fsso,dc=com"
set type regular
set username "cn=Administrator,cn=users,dc=fortinet-fsso,dc=com"
set password **********
next
end
2. Configure ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,059 | Security Profiles
5. Optionally, run the following command to verify WAD debugs:
# diagnose wad debug enable category icap
FSSO example
In this example, a local FSSO agent and remote user group are configured. When successful user authentication occurs,
FortiOS retrieves all the user information (such as the domain nam... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,060 | Security Profiles
...
06/20/2023 14:58:58 [ 1484] FortiGate connection accepted, auth OK.
06/20/2023 14:58:58 [ 1484] FortiGate:FG4H1E5819900343-root connected on socket (2004).
06/20/2023 14:58:58 [ 1484] send AUTH, len:26
06/20/2023 14:58:58 [ 1484] ready to read from socket
06/20/2023 14:58:58 [ 1484] Bytes received... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,061 | Security Profiles
Example
In this example, FortiGate acts as the ICAP client, and FortiProxy acts as the ICAP server. An ICAP profile is configured
on FortiGate with ocr-only enabled. An ICAP server is configured on FortiProxy with the icap-service configured to
use an image-analyzer ICAP profile.
When a client HTTP re... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,062 | Security Profiles
config icap profile
edit "ocr"
set request enable
set response enable
set ocr-only enable
set request-server "icap_server1"
set response-server "icap_server1"
next
end
To enable image scanning on the ICAP server:
1. On FortiProxy acting as an ICAP server, create an image-analyzer ICAP profile:
In this... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,063 | Security Profiles
Web application firewall
Web application firewall (WAF) profiles can detect and block known web application attacks. You can configure WAF
profiles to use signatures and constraints to examine web traffic. You can also enforce an HTTP method policy, which
controls the HTTP method that matches the spec... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,064 | Security Profiles
c. Click OK.
d. Enable Generic Attacks (Extended) and edit it so that it is enabled, the Action is set to Block, and the Severity is
set to High.
e. Click OK.
f. Click OK.
3. Apply the profile to a security policy:
a. Go to Policy & Objects > Firewall Policy and edit the policy that allows access to t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,065 | Security Profiles
4. Verify that the web application firewall blocks traffic:
a. Use the following URL to simulate an attack on your web server and substitute the IP address of your server:
http://<server
IP>/index.php?username=1'%20or%20'1'%20=%20'1&password=1'%20or%20'1'%20=%20'1
An error message appears, stating tha... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,066 | Security Profiles
Component Description
DLP profile Define rules for matching a sensor based on a file type or a message, and the
type of protocol being used. It also allows you to choose the action to allow, log,
block, or quarantine the address.
A DLP profile selects one or more sensors, and applies the sensor’s patt... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,067 | Security Profiles
Logging and blocking files by file name
Sometimes, file names are not accurately recorded in DLP logs, even though the files are blocked correctly based on the
DLP profile. This is particularly apparent on cloud-based services, such as Google Drive or SharePoint.
For HTTP file uploads, some cloud serv... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,068 | Security Profiles
Technique Description GUI CLI
See Built-in DLP data type on page 2075 for more information.
Custom data
classification tags (data
pattern)
FortiGate allows you to create patterns for your custom data type.
See Custom DLP data type on page 2075 for more information.
✓ ✓
True file type filtering Identif... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,069 | Security Profiles
l A DLP sensor defines which dictionary and/or EDM template to check. It counts the number of matches to
trigger the sensor.
3. Configure the DLP profile:
l A DLP profile allows for filtering by size and file type. See DLP file pattern on page 2076 for custom file type.
4. Add the DLP profile to a fir... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,070 | Security Profiles
the data type. If the patterns are invalid, FortiGate cannot use them, and no warning is displayed.
+All of these fields Click to pair each column in the external data file with a built-in data type.
All of the specified data in this section must match for FortiGate to take an
action.
Column index Spe... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,071 | Security Profiles
To configure a DLP profile:
1. Go to Security Profiles > Data Loss Prevention.
2. Select the Profile tab and click Create New.
3. Enter a name.
4. In the Rules section, click Create New.
5. Configure the following settings:
Name Filter name.
Data source type Specify what type of data source to use:
l... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,072 | Security Profiles
To configure a DLP dictionary:
config dlp dictionary
edit <name>
config entries
edit 1
set type {credit-card | hex | keyword | mip-label | regex | ssn-us}
set pattern <string>
set repeat {enable | disable}
set status {enable | disable}
next
end
next
end
To configure an EDM template:
When configuring a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,073 | Security Profiles
config entries
edit <id>
set dictionary <dlp dictionary or EDM template>
set count <integer>
set status {enable | disable}
next
end
next
end
See Evaluation by logical relationship on page 2077 for more information about match-eval.
To configure a DLP profile:
config dlp profile
edit <name>
set feature... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,074 | Security Profiles
Built-in DLP data type
Built-in DLP data type includes pre-defined data types to match for keyword, regex, hex, mip label, credit card, and social
security number (SSN). See Predefined data patterns on page 2068 for more information. The built-in DLP data type
regex employs DCM to detect patterns. See... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,075 | Security Profiles
set match-back <integer>
set pattern <string>
next
end
<name> The name of the table containing the data type.
pattern <string> Specify the regular expression pattern string without look around
verify <string> Specify the regular expression pattern string used to verify the data type.
verify2 <string> ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,076 | Security Profiles
set file-type <file_type>
next
end
next
end
Evaluation by logical relationship
Evaluation by logical relationship is a powerful tool used to combine multiple dictionary entries to define an accurate DLP
sensor using logical expression.
Syntax examples:
1. set eval "dict(1) == 2"
Match DLP sensor only ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,077 | Security Profiles
To configure a DLP fingerprint document:
config dlp fp-doc-source
edit <name>
set server <string>
set username <string>
set password <password>
set file-path <string>
set sensitivity <Critical | Private | Warning>
next
end
Command Description
server <string> Enter the IPv4 or IPv6 address of the file ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,078 | Security Profiles
Command Description
proto {smtp | pop3 | imap | httpget | http-post | ftp | nntp
| mapi | ssh | cifs}
Set the protocol to inspect.
filter-by fingerprint Set to match against a fingerprint sensitivity.
sensitivity {Critical | Private |
Warning}
Set the DLP file pattern sensitivity to match.
match-perc... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,079 | Security Profiles
next
end
This step can only be configured in the CLI.
2. Configure the DLP profile:
config dlp profile
edit "fingerprint"
set feature-set proxy
config rule
edit 1
set proto http-get
set filter-by fingerprint
set sensitivity "Critical"
set action block
next
end
next
end
DLP profiles that filter by fing... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,080 | Security Profiles
A download attempt of a text file from a Windows device was made using Chrome browser. This text file is located
on the protected server and its fingerprint is saved in the FortiGate fingerprint database.
The download was unsuccessful, leading to the creation of a sample log. See Sample log on page 20... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,081 | Security Profiles
l Credit card numbers
l Bank statements
When enabled, the DLP database (DLDB) is downloaded to the FortiGate and its predefined patterns can be configured
in DLP profiles.
To configure DLP database updates:
config system fortiguard
set update-dldb {enable | disable}
end
To verify the database signatur... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,082 | Security Profiles
set pattern "fortiguard dlp signature"
next
end
To configure the DLP profile in the GUI:
1. Configure the DLP sensor using the predefined dictionary from FortiGuard:
a. Go to Security Profiles > Data Loss Prevention, select the Sensor tab, and click Create New.
b. Enter a name (sin).
c. In the Sensor ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,083 | Security Profiles
e. Click OK.
f. Click OK to save the profile.
To configure the DLP profile in the CLI:
1. Configure the DLP sensor using the predefined dictionary from FortiGuard:
config dlp sensor
edit "sin"
config entries
edit 1
set dictionary "fg-can-natl_id-sin-dict"
next
end
next
end
2. Configure the DLP profile... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,084 | Security Profiles
Sensitivity labels
In order to safeguard your organization's data, labels can be employed as markers for sensitive information. Microsoft
provides sensitivity labels, which act as identifiers emphasizing the importance of the data they're associated with,
thereby enhancing the security measures in pla... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,085 | Security Profiles
1. Create and configure sensitivity labels and their policies. See Create sensitivity labels for more information.
2. Apply a sensitivity label to content. See Apply sensitivity labels to your files and email for more information.
Once the sensitivity label is applied on a file, you'll see it displaye... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,086 | Security Profiles
d. Configure the following settings:
Name mip-label
DATA source type MIP label
MIP dic-case5
Severity Critical
Action Block
Match type File
File type builtin-patterns
Protocol SMTP, POP3, IMAP, HTTP-GET HTTP-POST, FTP, NNTP, MAPI, SSH,
CIFS
e. Click OK.
f. Click OK to save the profile.
3. Add the DLP ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,087 | Security Profiles
edit 1
set name "mip-label"
set severity critical
set proto smtp pop3 imap http-get http-post ftp nntp mapi ssh cifs
set filter-by mip
set file-type 1
set label "dic-case5"
set action block
next
end
next
end
3. Add the DLP profile to a firewall policy:
config firewall policy
edit 1
set srcintf "port2"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,088 | Security Profiles
Exact data matching
Exact Data Matching (EDM) identifies particular data values within an indexed data source that require safeguarding. It
offer precise detection and handling of sensitive data based on user-defined criteria. This enhances security and
improves efficiency by reducing false-positive d... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,089 | Security Profiles
Data threat feed
A data threat feed is a dynamic list that contains data. The data is patterns for DLP data types. The dynamic list is stored
in a text (TXT) or comma-separated value (CSV) file format on an external server and periodically updated. After
FortiGate can access the file, the patterns can... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,090 | Security Profiles
In this example, an EDM template named Customer SSN EDM is created on the FortiGate. During this process, a CSV
file (customer_data.csv) located on an external server is imported using the data thread feed.
Sample CSV file:
SSN Last
Name
First
Name
Address City State ZIP Phone Email CCN
172-
32-
1176
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,091 | Security Profiles
a. Go to Security Profiles > Data Loss Prevention > EDM Template, and click Create New.
b. Specify a name for the template, such as Customer SSN EDM.
c. Set Resource type to External feed, and set External feed URL to the location of the file on the external server,
such as https://172.16.200.175/cust... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,092 | Security Profiles
g. Edit the DLP EDM template and click View Entries to view the data entries in the field.
When viewing EDM entries, the GUI currently does not validate the entries and
displays all entries as Valid. However, a Valid entry must have all values matching the
data-type of the specific column. If one valu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,093 | Security Profiles
5. Add the DLP profile to a firewall policy:
a. Go to Policy & Objects > Firewall Policy.
b. Click Create New.
c. Set the Inspection Mode to Proxy-based.
d. In the Security Profiles section, enable DLP Profile and select Profile SSN EDM.
e. Set SSL Inspection to deep-inspection.
f. Configure the other... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,094 | Security Profiles
next
end
next
end
4. Configure a DLP profile to use the DLP sensor.
config dlp profile
edit "Profile SSN EDM"
set feature-set proxy
config rule
edit 1
set name "Rule SSN EDM"
set type message
set proto http-post
set filter-by sensor
set sensor “Sensor SSN EDM”
set action block
next
end
next
end
5. Add... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,095 | Security Profiles
2. FortiGate blocks the user's attempt and displays a replacement message:
3. FortiGate generates a DLP log:
1: date=2024-07-31 time=09:24:44 eventtime=1722443083953870602 tz="-0700"
logid="0954024576" type="utm" subtype="dlp" eventtype="dlp" level="warning" vd="root"
ruleid=1 rulename="Rule SSN EDM" ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,096 | Security Profiles
NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0
Safari/537.36" httpmethod="POST" referralurl="https://dlptest.com/https-post/"
profile="Profile SSN EDM"
DLP examples
The following topics provide examples of DLP:
l Block HTTPS upload traffic that includes credit card inform... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,097 | Security Profiles
f. Click Apply.
g. Click OK to save the sensor.
3. Configure the DLP profile:
a. Go to Security Profiles > Data Loss Prevention, select the Profile tab, and click Create New.
b. Enter a name (profile-case1).
c. In the Rules section, click Create New.
d. Configure the following settings:
Name 1
Sensors... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,098 | Security Profiles
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. Set the Inspection Mode to Proxy-based.
c. In the Security Profiles section, enable DLP Profile and select profile-case1.
d. Configure the other settings as needed.
e. Click OK.
When a credit card is included in HTTP POST traffic, th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,099 | Security Profiles
set dstintf "port1"
set action accept
set srcaddr "all"
set dstaddr "all"
set srcaddr6 "all"
set dstaddr6 "all"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set profile-protocol-options "protocol"
set ssl-ssh-profile "protocols"
set dlp-profile "profile-case1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,100 | Security Profiles
To log FTP upload traffic that has specific keyword, regex, and hex patterns repeated for five times in
the GUI:
1. Configure the DLP dictionary with three entries:
a. Go to Security Profiles > Data Loss Prevention, select the Dictionary tab, and click Create New.
b. Enter a name (dic-case2).
c. In th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,101 | Security Profiles
f. Edit the new entry and set the Number of matches required to 5.
g. Click OK.
h. Click OK to save the sensor.
3. Configure the DLP profile:
a. Go to Security Profiles > Data Loss Prevention, select the Profile tab, and click Create New.
b. Enter a name (profile-case2).
c. In the Rules section, click... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,102 | Security Profiles
e. Click OK.
f. Click OK to save the profile.
4. Add the DLP profile to a firewall policy:
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. Set the Inspection Mode to Proxy-based.
c. In the Security Profiles section, enable DLP Profile and select profile-case2.
d. Configure the oth... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,103 | Security Profiles
config dlp profile
edit "profile-case2"
set feature-set proxy
config rule
edit 1
set proto ftp
set filter-by sensor
set file-type 1
set sensor "sensor-case2"
set action block
next
end
next
end
4. Add the DLP profile to a firewall policy:
config firewall policy
edit 1
set srcintf "port2"
set dstintf "... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,104 | Security Profiles
Block HTTPS downloads of EXE files and log HTTPS downloads of files larger than 500
KB
FortiGate can detect any file larger than the configured limit. See File size filtering on page 2069 for more information.
This configuration will block HTTPS downloads of EXE files and log HTTPS downloads of files ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,105 | Security Profiles
set utm-status enable
set inspection-mode proxy
set ssl-ssh-profile "custom-deep-inspection"
set dlp-profile "profile-case3-type-size"
set logtraffic all
set nat enable
next
end
4. Download an EXE file using HTTPS. The download is blocked, a replacement message appears, and a DLP log is
generated.
Sam... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,106 | Security Profiles
To block HTTPS upload traffic that includes Visa or Mastercard credit card information in the GUI:
1. Configure the DLP dictionary:
a. Go to Security Profiles > Data Loss Prevention, select the Dictionary tab, and click Create New.
b. Create an entry for Visa:
i. Enter a name (Finance_Credit_Card_Visa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,107 | Security Profiles
Name 1
Sensors Finance Credit Card High
Severity Critical
Action Block
Type File
File type builtin-patterns
Protocol HTTP-POST, HTTP-GET
e. Click OK.
f. Click OK to save the profile.
4. Add the DLP profile to a firewall policy:
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. Set t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,108 | Security Profiles
edit 1
set type "credit-card"
next
end
next
end
To use "?" in a regex pattern, see CLI basics on page 60. This method only supports direct
console connection and SSH. It does not support the CLI console in the GUI.
2. Configure the DLP sensor:
config dlp sensor
edit "Finance_Credit_Card_High"
config e... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,109 | Security Profiles
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set ssl-ssh-profile "deep-inspection"
set dlp-profile "cc_block"
set nat enable
next
end
When a Visa or Mastercard credit card is included in HTTP GET or POST t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,110 | Security Profiles
Web-based chatbot implementations are dynamic and and can exhibit a wide range of
variations. To maximize the effectiveness of blocking unwanted keywords, it is advised to add
both a message and a file-based DLP rule. While this method enhances detection, it may not
be entirely infallible. For optimal... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,111 | Security Profiles
d. Repeat step c and set Pattern to source code.
e. Click OK.
2. Configure the DLP sensor:
a. Go to Security Profiles > Data Loss Prevention, select the Sensor tab, then click Create New.
b. Set Name to llmapps.
c. In the Sensor Entries section, click Add. The Select Entries pane is displayed.
d. Sele... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,112 | Security Profiles
next
end
next
end
4. Configure the firewall address for the LLM application:
a. Go to Policy & Objects > Addresses, select the Standard tab, then click Create New.
b. Set the following:
Name <name>
Type FQDN
FQDN See FQDN on page 2115 for the FQDN on the specific LLM application.
c. Click OK.
5. Add t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,113 | Security Profiles
next
end
next
end
2. Configure the DLP sensor:
config dlp sensor
edit "llmapps"
config entries
edit 1
set dictionary "llmapps"
next
end
next
end
3. Configure the DLP profile:
config dlp profile
edit "llmapps"
set feature-set proxy
config rule
edit 1
set name "llmapps1"
set severity critical
set proto ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,114 | Security Profiles
next
end
6. Add the DLP profile and the FQDN address to a firewall policy:
config firewall policy
edit 1
set name "llmapps "
set srcintf "port2"
set dstintf "port1"
set action accept
set srcaddr "all"
set dstaddr "llmapps"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,115 | Security Profiles
3. Verify that the request failed and an error was generated.
4. Review the log that was generated when the attempt was made to send an HTTP POST request containing
sensitive keywords:
1: date=2024-03-15 time=09:59:35 eventtime=1710453575538415503 tz="+1200"
logid="0954024576" type="utm" subtype="dlp"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,116 | Security Profiles
3. Verify that the request failed and an error was generated.
4. Review the log that was generated when the attempt was made to send an HTTP POST request containing
sensitive keywords:
1: date=2024-03-15 time=09:50:29 eventtime=1710453029263609219 tz="+1200"
logid="0954024576" type="utm" subtype="dlp"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,117 | Security Profiles
3. Verify that the request failed and an error was generated.
4. Review the log that was generated when the attempt was made to send an HTTP POST request containing
sensitive keywords:
1: date=2024-03-15 time=12:46:08 eventtime=1710463568053453203 tz="+1200"
logid="0954024576" type="utm" subtype="dlp"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,118 | Security Profiles
c. Set Name to: matcharound.
d. In the Dictionary Entries table, click Create New:
i. Set Type to keyword
ii. Set Pattern to user
iii. Enable Case sensitive
iv. Click OK.
e. Click OK.
f. Select the newly created dictionary and click Edit.
g. Select Edit in CLI and enter the following command:
#set mat... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,119 | Security Profiles
Sensors user
Severity Critical
Action Block
Match Type Message
Protocol HTTP-POST
f. Click OK.
g. Click OK to save the profile.
5. Add the DLP profile to a firewall policy:
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. Set the Inspection Mode to Proxy-based.
c. In the Security P... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,120 | Security Profiles
The pattern specified using the set pattern command, is designed to match any word,
irrespective of case sensitivity, that contains between 6 and 12 characters. On the other
hand, the pattern specified using the set verify command employs a positive
lookbehind assertion. This assertion checks for the ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,121 | Security Profiles
6. Add the DLP profile to a firewall policy:
config firewall policy
edit 1
set name "keyword"
set srcintf "port2"
set dstintf "port1"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set ssl-ssh-profile "deep-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,122 | Security Profiles
l The high level provides maximum precision to minimize false positives.
l The medium level balances match quantity and precision.
l The low level captures the most matches, but may result in more false positives.
A valid DLP license is required to obtain the latest package.
When applying a FortiGuard... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,123 | Security Profiles
2. Test that an HTTPS message containing a SIN is blocked. DLP Test > HTTPS Post can be used to send a test
message:
The message is blocked:
FortiOS 7.6.2 Administration Guide 2124
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,124 | Security Profiles
3. Go to Log & Report > Security Events and view the Data Loss Prevention logs matching the can-natl_id-sin-dict-low
dictionary.
4. Check the raw logs:
1: date=2024-05-29 time=16:55:27 eventtime=1717026926501493215 tz="-0700"
logid="0954024576" type="utm" subtype="dlp" eventtype="dlp" level="warning" ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,125 | Security Profiles
3. Go to Log & Report > Security Events and view the Data Loss Prevention logs matching the can-natl_id-sin-dictmed dictionary.
4. Check the raw logs:
1: date=2024-05-29 time=17:43:38 eventtime=1717029818309788622 tz="-0700"
logid="0954024576" type="utm" subtype="dlp" eventtype="dlp" level="warning" ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,126 | Security Profiles
To verify that the FortiGuard dictionary with a high confidence level will block matching message
through an SMTP post:
1. Configure a DLP profile with a DLP sensor that uses the Canadian SIN card dictionary (fg-can-natl_id-sindict) DLP dictionary with the Confidence level set to High and then use th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,127 | Security Profiles
Virtual patching profiles
A virtual patching profile can be applied to firewall policies in any direction, protecting traffic from or to the vulnerable OT
devices. Virtual patching profiles can also be combined with virtual patching on NAC policies, so that vulnerable OT
devices are first assigned to ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,128 | Security Profiles
To configure virtual patching in the GUI, ensure that Virtual Patching is enabled on the System
> Feature Visibility page.
Virtual patching exemptions
The Signature ID field includes a dropdown below it with suggestions (signature name and ID). Users can select a
signature from the Suggestions dropdow... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,129 | Security Profiles
The Dashboard > Assets & Identities > Assets widget displays a tooltip for detected IoT and OT vulnerabilities when
hovering over the Vulnerabilities column.
Clicking View IoT/OT Vulnerabilities in the tooltip displays a list of vulnerabilities retrieved from the FortiGuard API server
for the device. ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,130 | Security Profiles
The right-side gutter of virtual patching profile pages includes information about the following:
l Operational Technology (OT) Security Service entitlement status
l OT Detection Definitions Package version
l OT Virtual Patching Signatures Package version
The System > FortiGuard > Subscriptions tab al... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,131 | Security Profiles
OT virtual patching basic examples
This topic contains two OT virtual patching examples: a basic configuration, and configuration that uses a NAC policy.
Example 1: basic configuration
This example demonstrates the flow for OT virtual patching from start to finish. First, a device (10.1.100.22) goes
t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,132 | Security Profiles
3. View the OT detection rules downloaded on the FortiGate. In this example, the OT detection rule ID 10000870 is a
specially crafted signature to match Apple iPad traffic to the OT category:
# get rule otdt status
app-name: "Apple.iPad"
id: 10000870
category: "OT"
cat-id: 34
popularity: 5.low
risk: 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,133 | Security Profiles
Severity Select Info, Low, Medium, High, and Critical
Action Block
Logging Enable
c. Click OK.
3. Apply the virtual patching profile to a firewall policy for traffic from port2 to port1:
a. Go to Policy & Objects > Firewall Policy and click Create New.
b. In the Security Profiles section, enable Virtu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,134 | Security Profiles
To test the virtual patching:
1. On the PC, generate traffic that simulates web traffic from an iPad. This traffic is generated in order for the FortiGate
to perform device detection on port2. The OT detection signature 10000870 will be triggered, which considers this
traffic from an OT device in this... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,135 | Security Profiles
service="HTTP" policyid=1 poluuid="a3424268-1ffc-51ed-3ba9-f3a60e2271cf"
policytype="policy" attack="WAP.Generic.XSS" srcport=47830 dstport=80
hostname="172.16.200.55" url="/index.html?<javascript>" agent="curl/7.61.1"
httpmethod="POST" direction="outgoing" attackid=10000684
Example 2: NAC policy
In t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,136 | Security Profiles
set device-identification enable
next
end
2. Configure the virtual patching profile:
config virtual-patch profile
edit "OT_check"
set severity info low medium high critical
next
end
3. Apply the virtual patching profile to a firewall policy:
config firewall policy
edit 1
set name "virtualpatch-policy"... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,137 | Security Profiles
Example
In this example, a device with a certain vulnerability severity is detected by the NAC policy on the FortiGate.
Subsequently, the FortiSwitch port in which it is connected to is moved to vlan300 where traffic can be controlled for
vulnerable devices. For more information about NAC policies, se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,138 | Security Profiles
e. Configure the other settings as needed.
f. Click OK.
2. Enable NAC mode on the desired FortiSwitch ports (port6 in this example):
a. Go to WiFi & Switch Controller > FortiSwitch Ports.
b. Select port6, then right-click and set the Mode to NAC.
3. Enable application control on the firewall policy th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,139 | Security Profiles
To configure virtual patching on NAC policies in the CLI:
1. Configure the VLAN in the MAC policy:
config switch-controller mac-policy
edit "IoT"
set fortilink "fortilink"
set vlan "vlan300"
next
end
2. Configure the NAC policy:
config user nac-policy
edit "IoT"
set category vulnerability
set severity... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,140 | Security Profiles
l certificate-inspection
l deep-inspection
l no-inspection
The custom-deep-inspection profile can be edited, or you can create your own SSL/SSH inspection profiles.
Deep inspection (also known as SSL/SSH inspection) is typically applied to outbound policies where destinations are
unknown. Depending on... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,141 | Security Profiles
when inspecting outbound internet traffic. Other SSL Inspection Options
become available to configure if this option is selected.
l Protecting SSL Server: Use this option when setting up a profile
customized for a specific SSL server with a specific certificate. Define the
certificate using the Server... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,142 | Security Profiles
Inspect all ports Inspect all ports with the IPS engine by enabling Inspect all ports.
Choose whether to disable DNS over TLS.
HTTPS, SMTPS,
POP3S, IMAPS,
FTPS
If Inspect all ports is disabled, specify the port through which traffic will be
inspected in the field next to the listed protocols.
See Insp... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,143 | Security Profiles
Invalid SSL
certificates
Allow or block the passing of traffic in invalid certificates. Additional common
options that provide more granularity with actions for different types of invalid
SSL certificates will become available if Invalid SSL certificates is set to
Custom:
l Expired certificates: Actio... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,144 | Security Profiles
Replacement messages for HTTPS connections
When using certificate inspection in a firewall policy, a user will encounter a block page served in HTTPS when
accessing an HTTPS web page that triggers a replacement message.
The replacement message can display for many reasons, such as a page being blocked... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,145 | Security Profiles
For your clients to no longer see a warning message for an invalid certificate, install the respective CA certificate in the
client's certificate store.
To download the CA certificate:
1. Go to Security Profiles > SSL/SSH Inspection.
2. Edit the SSL/SSH inspection profile that is being used in the fir... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,146 | Security Profiles
4. Configure the remaining setting as needed.
5. Click OK.
Common options
Invalid SSL certificates can be blocked, allowed, or a different actions can be configured for the different invalid
certificates types. See Configuring an SSL/SSH inspection profile on page 2141.
Deep inspection
You can configu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,147 | Security Profiles
l SMTPS
l POP3S
l FTPS
l DNS over TLS
Each protocol has a default TCP port. The ports can be modified to inspect any port with flowing traffic. The packet
headers indicate which protocol generated the packet.
Protocol port mapping only works with proxy-based inspection. Flow-based inspection
inspects ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,148 | Security Profiles
If you want to exempt commonly trusted web sites, you can bypass the SSL allowlist in the SSL/SSH profile by enabling
Reputable websites. The allowlist includes common web sites trusted by FortiGuard.
SSL version support
There are two ways to limit which SSL versions deep inspection is applied to.
l I... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,149 | Security Profiles
Flow-based inspection does not support SSL version control.
HTTPS and DOT options can enable QUIC inspection using the set quic inspect
command. See DNS over QUIC and DNS over HTTP3 for transparent and local-in DNS
modes on page 1915 for more information.
Protecting an SSL server
The Protecting SSL Se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,150 | Security Profiles
Handling SSL offloaded traffic from an external decryption device
In scenarios where the FortiGate is sandwiched between load-balancers and SSL processing is offloaded on the
external load-balancers, the FortiGate can perform scanning on the unencrypted traffic by specifying the ssloffloaded option i... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,151 | Security Profiles
set ssl-offloaded yes
end
config imap
set ports 143
set options fragmail
set ssl-offloaded yes
end
config pop3
set ports 110
set options fragmail
set ssl-offloaded yes
end
config smtp
set ports 25
set options fragmail splice
set ssl-offloaded yes
end
next
end
Verifying the packet captures
The ADC1 inc... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,152 | Security Profiles
The ADC2 outgoing port capture shows that ADC2 forwards HTTPS traffic to the server:
SSH traffic file scanning
FortiGates can buffer, scan, log, or block files sent over SSH traffic (SCP and SFTP) depending on the file size, type, or
contents (such as viruses or sensitive content).
This feature is sup... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,153 | Security Profiles
To configure SCP block and log options:
config ssh-filter profile
edit <name>
set block scp
set log scp
next
end
To configure the DLP profile:
config dlp profile
edit <name>
set full-archive-proto ssh
set summary-proto ssh
config filter
edit 1
set proto ssh
next
end
next
end
To configure the antivirus... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,154 | Security Profiles
set block scp
set log scp
next
end
To apply the ssh-filter to a policy:
config firewall policy
edit <id>
set utm-status enable
set inspection-mode proxy
set ssh-filter-profile <ssh-filter profile>
next
end
Redirect to WAD after handshake completion
In a proxy-based policy, the TCP connection is proxie... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.