Description | This article describes that when UTM profiles such as web filter, antivirus, or application control are applied in the firewall policy, the firewall will open ports 8008, 8010, 8015, or 8020. This article describes the details of how each profile type opens those ports. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Scope | FortiGate. | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Solution |
The table below shows the port status when each UTM profile type is used.
Here is the table for proxy-based policy:
When a TCP SYN packet is sent through the firewall on port 8008, 8010, 8015, or 8020 even to a non-existing IP in the destination LAN, but matches the firewall policy that has the UTM profiles applied. The firewall behaves like the below:
Even when the test result shows the port is open, the traffic does not leak through the policy on that port. If for security compliance reasons those ports cannot show as an open state, they can be closed by the below command:
In multi-VDOM mode, the setting is in Global VDOM:
config global |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.