Fortinet white logo
Fortinet white logo

Administration Guide

ICAP scanning with FTP

ICAP scanning with FTP

Transferred files can be forwarded to the ICAP server for further processing using FTP.

To configure ICAP scanning with FTP in the GUI:
  1. Configure an ICAP remote server.
  2. Create an ICAP profile that references the server.
    Note
    • Select FTP in Protocol.

    • Select the server you created in step 1 in Server.

  3. Enable and configure explicit FTP Proxy.
  4. Create an explicit FTP proxy policy that uses the ICAP profile.
    Note
    • Select FTP under Type for an explicit FTP proxy policy.

    • Select ACCEPT for Action to enable the Security Profiles options. You can then enable ICAP and select the ICAP profile you configured in step 2 from the dropdown list.

To configure ICAP scanning with FTP in the CLI:
  1. Configure an ICAP remote server:

    config icap remote-server
        edit "icap1"
            set ip-address 172.18.20.43
        next
    end

    See config icap remote-server in the CLI guide for more details.

  2. Create an ICAP profile that references the server:

    config icap profile
        edit "icapFTP"
            set file-transfer ftp
            set file-transfer-server "icap1"
            set file-transfer-failure error
            set file-transfer-path "ftpicap"
        next
    end

    See config icap profile in the CLI guide for more details.

  3. Enable and configure explicit FTP Proxy:
    config ftp-proxy explicit
        set status [enable|disable]
        set incoming-port {user}
        set incoming-ip {ipv4-address-any}
        set outgoing-ip {ipv4-address-any}
        set sec-default-action [accept|deny]
        set server-data-mode [client|passive]
        set ssl [enable|disable]
        set ssl-cert {string}
        set ssl-dh-bits [768|1024|...]
        set ssl-algorithm [high|medium|...]
    end

    See config ftp-proxy explicit in the CLI guide for more details.

  4. Create an explicit FTP proxy policy that uses the ICAP profile:

    config firewall policy
        edit 1
            set type explicit-ftp
            set name "test"
            set dstintf "any"
            set srcaddr "all"
            set dstaddr "all"
            set action accept
            set schedule "always"
            set ssl-ssh-profile "certificate-inspection"
            set utm-status enable
            set icap-profile "icapFTP"
        next
    end

    See config firewall policy in the CLI guide for more details.

ICAP scanning with FTP

ICAP scanning with FTP

Transferred files can be forwarded to the ICAP server for further processing using FTP.

To configure ICAP scanning with FTP in the GUI:
  1. Configure an ICAP remote server.
  2. Create an ICAP profile that references the server.
    Note
    • Select FTP in Protocol.

    • Select the server you created in step 1 in Server.

  3. Enable and configure explicit FTP Proxy.
  4. Create an explicit FTP proxy policy that uses the ICAP profile.
    Note
    • Select FTP under Type for an explicit FTP proxy policy.

    • Select ACCEPT for Action to enable the Security Profiles options. You can then enable ICAP and select the ICAP profile you configured in step 2 from the dropdown list.

To configure ICAP scanning with FTP in the CLI:
  1. Configure an ICAP remote server:

    config icap remote-server
        edit "icap1"
            set ip-address 172.18.20.43
        next
    end

    See config icap remote-server in the CLI guide for more details.

  2. Create an ICAP profile that references the server:

    config icap profile
        edit "icapFTP"
            set file-transfer ftp
            set file-transfer-server "icap1"
            set file-transfer-failure error
            set file-transfer-path "ftpicap"
        next
    end

    See config icap profile in the CLI guide for more details.

  3. Enable and configure explicit FTP Proxy:
    config ftp-proxy explicit
        set status [enable|disable]
        set incoming-port {user}
        set incoming-ip {ipv4-address-any}
        set outgoing-ip {ipv4-address-any}
        set sec-default-action [accept|deny]
        set server-data-mode [client|passive]
        set ssl [enable|disable]
        set ssl-cert {string}
        set ssl-dh-bits [768|1024|...]
        set ssl-algorithm [high|medium|...]
    end

    See config ftp-proxy explicit in the CLI guide for more details.

  4. Create an explicit FTP proxy policy that uses the ICAP profile:

    config firewall policy
        edit 1
            set type explicit-ftp
            set name "test"
            set dstintf "any"
            set srcaddr "all"
            set dstaddr "all"
            set action accept
            set schedule "always"
            set ssl-ssh-profile "certificate-inspection"
            set utm-status enable
            set icap-profile "icapFTP"
        next
    end

    See config firewall policy in the CLI guide for more details.