Created on
05-27-2025
07:21 AM
Edited on
05-27-2025
07:24 AM
By
Jean-Philippe_P
| Description | This article describes how FortiGate, configured in Policy-Mode, behaves when downloading the EICAR file. |
| Scope | FortiOS Policy-Mode. |
| Solution |
FortiGate FortiOS operates in 2 different modes: Profile-Mode and Policy-Mode. Profile mode is the traditional FortiOS method where profiles for security actions are created (like antivirus and web filter) and then applied to policies, while policy mode allows defining these security actions directly within the policies, without needing preconfigured profiles.
There is a fundamental difference in how profile and policy modes operate.
Regarding antivirus and IPS scanning, in profile mode, FortiOS matches incoming packets against some very basic static conditions - src/dst IP and port, schedule, etc. All of them are always available and decide on which firewall profile to apply. That allows it to apply antivirus scanning from the very first byte of the session.
In the policy mode, IPS tries to detect what app generated the traffic - Facebook, YouTube, ChatGPT - and only after it is detected does it select and apply the policy.
Signatures tell IPS how many bytes they need to inspect before a particular signature will not be applicable anymore.
There is a strict limit that none of the signatures can request more than 4 KB of data, so it's quite expected that it may not decide on the policy before that.
As the EICAR test file is only 68 bytes long, it'll be downloaded way before FortiGate decides it is not one of the apps from the config. This means that for FortiGate in policy mode, the EICAR test file might not be the best way to test firewall behavior, and antivirus/IPS might allow this test file to go through.
Example: Firewall in Policy mode:
config system settings
Antivirus profile:
config antivirus profile
Firewall policy with antivirus and IPS enabled:
config firewall security-policy
Normal NAT configured through the Central-SNAT section:
config firewall central-snat-map
SSL Inspection profile applied:
config firewall policy
Note: FortiGate CA SSL certificate needs to be installed in the trusted root certificate authority.
What is observed from the end user:
The EICAR text file is downloaded by the end user. When the operation mode is changed from policy to profile mode, the behavior also changes:
Firewall Policy:
config firewall policy
What is observed from the end user:
Keep in mind that when changing operation mode from policy to profile and vice versa, all firewall policies will be deleted. This needs to be done with caution, and always do a backup of the current configuration before proceeding with the change. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.