Fortinet white logo
Fortinet white logo

Administration Guide

SSH traffic file scanning

SSH traffic file scanning

FortiGates can buffer, scan, log, or block files sent over SSH traffic (SCP and SFTP) depending on the file size, type, or contents (such as viruses or sensitive content).

Note

This feature is supported in proxy-based inspection mode. It is currently not supported in flow-based inspection mode.

This feature is not supported on FortiGate models with 2 GB RAM or less. See Proxy-related features not supported on FortiGate 2 GB RAM models for more information.

You can configure the following SSH traffic settings in the CLI:

  • Protocol options

  • DLP profile

  • Antivirus (profile and quarantine options)

To configure SSH protocol options:
config firewall profile-protocol-options
    edit <name>
        config ssh
           set options {oversize clientcomfort servercomfort}
           set comfort-interval <1 - 900>
           set comfort-amount <1 - 65535>
           set oversize-limit <1 - 798>
           set uncompressed-oversize-limit <0 - 798>
           set uncompressed-nest-limit <2 - 100>
           set scan-bzip2 {enable | disable}
        end
    next
end
To configure SCP block and log options:
config ssh-filter profile
    edit <name>
        set block scp
        set log scp
    next
end
To configure the DLP profile:
config dlp profile
    edit <name>
        set full-archive-proto ssh
        set summary-proto ssh
        config filter
            edit 1
                set proto ssh
            next
        end
    next
end
To configure the antivirus profile options:
config antivirus profile
    edit <name>
        config ssh
            set av-scan {disable | block | monitor}
            set outbreak-prevention {disable | block | monitor}
            set external-blocklist {disable | block | monitor}
            set fortindr {disable | block | monitor}
            set quarantine {enable | disable}
            set archive-block {encrypted corrupted partiallycorrupted multipart nested mailbomb timeout unhandled}
            set archive-log {encrypted corrupted partiallycorrupted multipart nested mailbomb timeout unhandled}
            set emulator {enable | disable}
        end
    next
end
To configure the antivirus quarantine options:
config antivirus quarantine
    set drop-infected ssh
    set store-infected ssh
    set drop-machine-learning ssh
    set store-machine-learning ssh
end
To configure SCP block and log options:
config ssh-filter profile
    edit <name>
        set block scp
        set log scp
    next
end
To apply the ssh-filter to a policy:
config firewall policy
    edit <id>
        set utm-status enable
        set inspection-mode proxy
        set ssh-filter-profile <ssh-filter profile>
    next
end

SSH traffic file scanning

SSH traffic file scanning

FortiGates can buffer, scan, log, or block files sent over SSH traffic (SCP and SFTP) depending on the file size, type, or contents (such as viruses or sensitive content).

Note

This feature is supported in proxy-based inspection mode. It is currently not supported in flow-based inspection mode.

This feature is not supported on FortiGate models with 2 GB RAM or less. See Proxy-related features not supported on FortiGate 2 GB RAM models for more information.

You can configure the following SSH traffic settings in the CLI:

  • Protocol options

  • DLP profile

  • Antivirus (profile and quarantine options)

To configure SSH protocol options:
config firewall profile-protocol-options
    edit <name>
        config ssh
           set options {oversize clientcomfort servercomfort}
           set comfort-interval <1 - 900>
           set comfort-amount <1 - 65535>
           set oversize-limit <1 - 798>
           set uncompressed-oversize-limit <0 - 798>
           set uncompressed-nest-limit <2 - 100>
           set scan-bzip2 {enable | disable}
        end
    next
end
To configure SCP block and log options:
config ssh-filter profile
    edit <name>
        set block scp
        set log scp
    next
end
To configure the DLP profile:
config dlp profile
    edit <name>
        set full-archive-proto ssh
        set summary-proto ssh
        config filter
            edit 1
                set proto ssh
            next
        end
    next
end
To configure the antivirus profile options:
config antivirus profile
    edit <name>
        config ssh
            set av-scan {disable | block | monitor}
            set outbreak-prevention {disable | block | monitor}
            set external-blocklist {disable | block | monitor}
            set fortindr {disable | block | monitor}
            set quarantine {enable | disable}
            set archive-block {encrypted corrupted partiallycorrupted multipart nested mailbomb timeout unhandled}
            set archive-log {encrypted corrupted partiallycorrupted multipart nested mailbomb timeout unhandled}
            set emulator {enable | disable}
        end
    next
end
To configure the antivirus quarantine options:
config antivirus quarantine
    set drop-infected ssh
    set store-infected ssh
    set drop-machine-learning ssh
    set store-machine-learning ssh
end
To configure SCP block and log options:
config ssh-filter profile
    edit <name>
        set block scp
        set log scp
    next
end
To apply the ssh-filter to a policy:
config firewall policy
    edit <id>
        set utm-status enable
        set inspection-mode proxy
        set ssh-filter-profile <ssh-filter profile>
    next
end