UTM scanning on TCP forwarding access proxy traffic
UTM scanning and deep inspection is supported for multiple protocols in a ZTNA TCP forwarding access proxy. In addition to HTTP and HTTPS, the mail protocols (SMTP, IMAP, and POP3) and file sharing protocols (SMB and CIFS) are supported.
Examples
AV scanning for normal POP3, IMAP, and SMTP traffic
To configure AV scanning for normal POP3, IMAP, and SMTP traffic:
-
In FortiClient, add ZTNA connection rules for the email server IP and POP3, IMAP, and SMTP ports.
-
On the FortiProxy, configure the ZTNA TCP forwarding server to add the email server address and enable AV profile scanning in the ZTNA rules.
-
On the client PC, open Outlook app and send emails with attachments containing virus affected files.
-
The ZTNA rule on the FortiProxy blocks the email send/receive traffic and generates AV logs.
AV deep scanning for SSL encrypted POP3S, IMAPS, and SMTPS traffic
To configure AV deep scanning for SSL encrypted POP3S, IMAPS, and SMTPS traffic:
-
In FortiClient, add ZTNA connection rules for the email server IP and POP3S, IMAPS, and SMTPS ports.
-
On the FortiProxy, configure the ZTNA TCP forwarding server to add the email server address and enable AV profile scanning in the ZTNA rules.
-
On the client PC, open Outlook app and send emails with attachments containing virus affected files.
-
The ZTNA rule on the FortiProxy blocks the email send/receive traffic and generates AV logs.
AV scanning for SMB service traffic
To configure AV scanning for SMB service traffic:
-
In FortiClient, add ZTNA connection rules for the SMB file sharing server IP and ports.
-
On the FortiProxy, configure the ZTNA TCP forwarding server to add the SMB server address and enable AV profile scanning in the ZTNA rules.
-
On the client PC, upload and download virus affected files to and from the SMB server.
-
The ZTNA rule on the FortiProxy blocks the email send/receive traffic and generates AV logs.
File filter scanning for CIFS service traffic
To configure file filter scanning for CIFS service traffic:
- In FortiClient, add ZTNA connection rules for the CIFS server IP and port.
- On the FortiProxy, configure the ZTNA TCP forwarding server to add the CIFA server address and enable file filter profile scanning in the ZTNA rules.
- On the client PC, upload and download predefined file types (such as .EXE) to and from the CIFS server.
- The ZTNA rule on the FortiProxy blocks the email send/receive traffic and generates AV logs.