Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
config firewall address edit " update.microsoft.com" set associated-interface " wan1" set type fqdn set fqdn " update.microsoft.com" next edit " download.windowsupdate.com" set associated-interface " wan1" set type fqdn set fqdn " download.windowsupdate.com" next edit " windowsupdate.microsoft.com" set associated-interface " wan1" set type fqdn set fqdn " windowsupdate.microsoft.com" next end config firewall addrgrp edit " Windows-Updates" set member " download.windowsupdate.com" " update.microsoft.com" " windowsupdate.microsoft.com" next end config firewall policy edit 1001 set srcintf " Internal" set dstintf " wan1" set srcaddr " all" set dstaddr " Windows-Updates" set action accept set schedule " always" set service " ANY" set nat enable next end
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
How can I tell if our file-size block is as a result of the DLP or AV policies?DLP refers to scanning of information, usually from internal -> going out. AV polices is scanning in either direction. I am more incline to think your problem is the scan buffer size on incoming http (or HTTPS) traffic. Under 4.0MR3 (guessing it should be similar under 4.0), the fgt' s scan buffer size is configurable under the " config firewall profile-protocol-options" section. The default size is set at 10 mb, per protocol. Each protocol section has a set of options you can define, including blocking or allowing files that go over the size limit. (See the FortiOS CLI reference for your version.) Using the GUI is much prettier/easier tlo use than mucking around in the CLI...
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Under 4.0MR3 (guessing it should be similar under 4.0), the fgt' s scan buffer size is configurable under the " config firewall profile-protocol-options" section. The default size is set at 10 mb, per protocol. Each protocol section has a set of options you can define, including blocking or allowing files that go over the size limit. (See the FortiOS CLI reference for your version.)It should be noted that you can create/customized different Protocol Options and tailor them to specific traffic. If your company has a policy about blocking over sized files (that are not virus scanned) you can always create a new Protocol Options for Microsoft related traffic that allows over-sized files through, assuming the company would rather have UTM enabled on that traffic as well.
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
By the way, would we have to be in support (we' re out) to upgrade the firmware on the fgt or are they available to download? Any strong reasons to update, or not?You need a valid Fortinet support login ID/password to access the firmware download section. Whether you need a valid product/subscription is a good question. Personally, I love working with and configuring firmware 4.0 MR3, followed closely by 4.0 MR2 and would personally recommend upgrading to either firmware paths (depending on what feature set you need). It' s important to note when upgrading the firmware on the Fortigate is to follow the upgrade path outlined in the firmware notes. If upgrading from 4.0 you will likely need to go through several firmware upgrades to get to the firmware/patch level you want (assuming you want to keep the current config/firewall rules). Personally, if I was dealing with more than 4 firmware upgrades, I might just consider blowing away (e.g. format the boot device) and tftp a new firmware image on it, then rebuild the config from scratch or use WinMerge.
NSE4/FMG-VM64/FortiAnalyzer-VM/6.0 (FWF30E/FW92D/FGT200D/FGT101E/FGT81E)/ FAP220B/221C
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1712 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.