waf ftp-command-restriction-rule
Use this command to create FTP command restriction rules to specify acceptable FTP commands that clients can use to communicate with your server(s). Certain FTP commands can expose your server(s) to attack. For example, because attackers can exploit the PORT
command to carry out FTP bounce attacks, restricting the PORT
command can harden your network's security if you're using FTP.
For details about applying an FTP command restriction rule to an FTP server policy, see waf ftp-protection-profile.
To use this command, your administrator account’s access control profile must have either w
or rw
permission to the sysgrp
area. For details, see Permissions.
If |
Syntax
config waf ftp-command-restriction-rule
edit "<rule_name>"
set action {alert | alert_deny | block-period | deny_no_log}
set block-period <block_period_int>
set severity {High | Info | Low | Medium}
next
end
config command-types
edit <entry_index>
set command-type <ftp_command>
next
end
Variable | Description | Default | |||
Enter a unique name that can be referenced in other parts of the configuration. Don't use spaces or special characters. The maximum length is 63 characters. |
No default. |
||||
Enter an index number of the individual entry in the table. The valid range is 1–999,999,999,999,999,999. You must create an entry index for each FTP command that you plan to include in the rule. |
No default. |
||||
Enter an FTP command that you want to include in the rule. You can include these FTP commands in the rule:
|
No default. |
||||
Select which action FortiWeb will take when it detects a violation of the rule:
Note: This setting will be ignored if monitor-mode {enable | disable}is enabled in a server policy. |
alert |
||||
Enter the number of seconds that you want to block subsequent requests from a client after FortiWeb detects that the client has violated the rule. The valid range is 1–3,600 seconds. This setting is available only if action {alert | alert_deny | block-period | deny_no_log} is set to |
|
||||
When rule violations are recorded in the attack log, each log message contains a Severity Level (
|
Medium |
||||
Enter the name of a trigger policy, if any, that FortiWeb will use when it logs and/or sends an alert email about a violation of the rule. |
No default. |