FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
FortiArt
Staff
Staff
Article Id 370975
Description This article describes how to allow Splashtop application traffic to pass through FortiGate.
Scope FortiGate.
Solution

Scenario:

 

Splashtop is a remote desktop application. In cases where there is a main outbound Internet Access policy that is very restrictive, i.e., one that must use most of the UTM profiles for security reasons and in proxy-inspection mode, the Splashtop application traffic stops passing through FortiGate. Using flow-inspection mode works but this is not an option.

 

Searching forward policy logs for the main outbound Internet Access policy shows a 'connection failed' error indicating none of the UTM security profiles is the source of the block. However, on removing the UTM security profiles from the policy, the Splashtop application traffic starts passing through FortiGate but this is also not an option.

 

Solution:

 

On top of the main Internet access policy, which is in the proxy-inspection mode that must have UTM profiles, create a similar policy with Splashtop-Splastop ISDB Object as the only destination to allow the traffic preferably without UTM security profiles.

 

policy.PNG

 

Note: Anti-virus or IPS UTM security profiles can be added to the Splashtop-Splastop policy if there are some security concerns.

 

Related articles: