Description |
This article describes that in some situations, it is necessary to block file types such as .pdf , .png , .jpeg ,or etc via SFTP protocol, but it would not be possible to find the setting via GUI by default in FortiGate. SFTP is also known as Secure File Transfer Protocol. |
Scope |
FortiGate v7.2.x. |
Solution |
Correct the setting with file filter:
From CLI:
FGT # config file-filter profile FGT # edit SFTPtest1 FGT # config rules FGT # edit SFTPtestRule1 FGT # set protocol ssh FGT # set action block FGT # set file-type pdf png jpeg FGT # end FGT # next FGT # end
Then, it will be possible to see the SSH feature under the Protocol of 'File Filter Rule'.
Name : deep-inspectionTestSFTP1 Inspection method : Full SSL Inspection >SSH Inspection Options >SSH deep scan : enable > SSH port : Specify : 22 >OK
Note: Inspection all ports: Enable it if not sure about the SFTP port. SSH port: Choose to be 'Any' not sure about the SFTP port.
Put the Interface, Address, Service, and etc.
From CLI:
FGT # config firewall policy FGT # edit <XX> <----- XX is the firewall policy ID that focuses on. FGT # end
> File Filter : SFTPtest1 'SFTPtest1' created when 'Inspection Mode' is 'Proxy-based'. Choose 'SFTPtest'” created under1. -SSL Inspection : deep-inspectionTestSFTP1 ( Choose the one that you create on step 2) ) >OK
FortiGate should be able to block those files via SFTP protocol after that. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.