Description |
This article describes an issue where SMB access fails when a firewall policy is configured with an Anti-Virus security profile set to 'Proxy-Based' inspection mode. |
Scope |
FortiGate v7.2.6, v7.2.7. |
Solution |
When the Anti-Virus security profile is configured to 'Proxy-Based' inspection mode and is enabled within the firewall policy, the WAD daemon blocks access to SMB resources when the client uses authentication methods other than NTLM or Kerberos, before it defaults to NTLM authentication.
This issue has been resolved in FortiOS versions 7.2.9, 7.4.4, 7.4.5.
Workaround: Disable Proxy based AV profile in the firewall policy or Switch to flow based Anti-Virus profile or Disable PKU2U authentication on the client PC.
Logs required by FortiGate TAC for investigation.
diagnose wad filter src <IP_Address> diagnose wad debug enable level verbose diagnose wad debug enable category all diagnose debug console timestamp enable diagnose debug enable
Reproduce the issue.
diagnose debug reset
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.