Hi,
I use a FortiGate 50E in our company and have IPS enabled. After the upgrade to 6.0, a script that uploads data via SFTP (WinSCP commandline) doesn't work anymore. The connection requires a private-keyfile (*.ppk), which is somehow blocked IPS. The keyfile doesn't reach the server for authentification.
I now deactivated IPS but that's not the solution I have in mind. Any ideas what I could do?
You could add the IP address as an exception to the IPS policy. Firstly find the IPS signature that is causing this issue (should be easy to find in the IPS logs), then edit your IPS profile and add that signature as an exception, then add the IP address of the sending server as an IP exception.
Thanks. This was also in my mind. However, I am not able to identify the signature: My IPS log is completely empty. Either I missed a setting to turn on the log (I set the filter to "monitor" and enabled packet logging, but the log's still completely empty) or it's in fact not an IPS "hit" but the filter somehoew breaks the transmission of the key file... Any thoughts?
Bump - Any suggestions?
Any update on this, icdata? Having exactly the same issue at the moment.
Got some news from Support that should fix your issue:
The key rotation is a feature of the SSH inspection. There’s no way to turn it off but we can manually set this key permanently. Try to set the public key manually:
config firewall ssh host-key edit "1" set type RSA set ip x.x.x.x set hostname <server hostname> set public-key "<public key in quotes>" next end
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1740 | |
1108 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.