ICAP configuration example
In this example, the ICAP server performs proprietary content filtering on HTTP and HTTPS requests. If the content filter is unable to process a request, then the request is blocked. Streaming media is not considered by the filter, so it is allowed through and is not processed.
To configure the ICAP setup in the GUI:
- Add the ICAP server:
- Go to Security Profiles > ICAP Servers and click Create New.
- In the Name field, enter a name for the ICAP server, such as content-filtration-server4.
- Select the IP Version.
- In the IP Address field, enter the IP address of the ICAP server.
- In the Port field, enter a new port number if required. The default value is 1344.
- Click OK.
The maximum number of concurrent connections to ICAP server can be configured in the CLI (
set max-connections
). The default setting is 100 connections. - Create the ICAP profile:
- Go to Security Profiles > ICAP and click Create New.
- In the Name field, enter a name for the ICAP profile, such as Prop-Content-Filtration.
- Enable Request Processing and set the following:
- Server: select the ICAP server (content-filtration-server4).
- Path: enter the path to the processing component on the server, such as /proprietary_code/content-filter/.
- On Failure: select Error to block the request. If the message cannot be processed, it will not be blocked.
- Enable Response Processing and set the following:
- Server: select the ICAP server (content-filtration-server4).
- Path: enter the path to the processing component on the server, such as /proprietary_code/content-filter/.
- On Failure: select Error to block the request. If the message cannot be processed, it will not be blocked.
- Enable Streaming Media Bypass to not offload streaming media to the ICAP server.
- Click OK.
- Add the ICAP profile to a policy:
- Go to Policy & Objects > Firewall Policy and click Create New.
- Set Inspection Mode to Proxy-based.
- Under Security Profiles, enable ICAP and select the ICAP server.
- Configure the other settings as needed.
- Click OK.
To configure the ICAP setup in the CLI:
- Add the ICAP server:
config icap server edit "content-filtration-server4" set ip-version 4 set ip-address 172.16.100.55 set port 1344 set max-connections 200 next end
- Create the ICAP profile:
config icap profile edit "Prop-Content-Filtration" set request enable set response enable set streaming-content-bypass enable set request-server "content-filtration-server4" set response-server "content-filtration-server4" set request-failure error set response-failure error set request-path "/proprietary_code/content-filter/" set response-path "/proprietary_code/content-filter/" set methods delete get head options post put trace other next end
- Add the ICAP profile to a policy:
config firewall policy edit 5 set name "icap_filter3" set srcintf "virtual-wan-link" set dstintf "virtual-wan-link" set srcaddr "FABRIC_DEVICE" set dstaddr "FABRIC_DEVICE" set dstaddr-negate enable set action accept set schedule "always" set service "ALL" set utm-status enable set inspection-mode proxy set ssl-ssh-profile "certificate-inspection" set icap-profile "Prop-Content-Filtration" set logtraffic disable set fsso disable set nat enable next end