- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
fortigate ips sensor when protocol is selected, and traffic uses a nonstandard port
Located this, in the docs regardng FortiProxy.
"Application control uses IPS protocol decoders that can analyze network traffic to detect application traffic even if the traffic uses nonstandard ports or protocols."
I am assuming that when I have an IPS sensor configured that specifies, for example, the SSH protocol, it does not care what port the traffic is using. But inspects the traffic to identify the SSH protocol.
Is there somewhere in the docs this is noted, for more than FortiProxy?
- Labels:
-
FortiGate
-
Intrusion prevention
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to some test I've done, FG's IPS blocks the known attack even on a non-standard port.
Here is the performed test:
Sun.Solaris.Telnet.Remote.Authentication.Bypass on a telnet server listening on standard port 23 -> Attack blockedSun.Solaris.Telnet.Remote.Authentication.Bypass on a telnet server listening on non-standard port 10023 -> Attack blocked
Edit: Redoing tests and coming back.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello @dbeitler ,
You can check this cookbook: https://docs.fortinet.com/document/fortigate/7.4.2/administration-guide/399269
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
If a detection can be made on the unencrypted parts (certificate, SNI, some initial headers during the unencrypted part of a handshake that establishes encryption, ...), then such signature will work without deep-inspection.
