Is there a way to decrypt https traffic for content inspection? For
instance, I have an owa site which I publish to wan as pass thru ssl. I
would like to be able to inspect what exchange server returns. Thanks in
advance
I suppose it is useless to filter by pattern https traffic from server
as fortigate sees garbage in packets. Is there something like ssl bump
where fortigate decrypts traffic, inspects it, and encrypts it before
sending response? Thanks in advance
I have published web server to wan. I am blocking http traffic based on
url using web filter. However, this still generates traffic. Is there a
way to block a source ip after a number of times a blocked url is
requested? Thanks in advance
I am running squid reverse proxy behind my firewall. It appears someone
sends me these bump requests. What can I do to block them? Is there an
ips that looks at http headers and blocks the requester?
..............E..dm.@.....|...`9.....P..].-..#P......
ORIGINAL: rwpatterson Well, is ' VOIP' interface VLAN 500 or VLAN 550
(or both)? Does " VOIP Lan" contain both subnets? This is only VLAN 550
and VOIP lan is only VLAN 550 subnet. I have the same policy preceeding
it except there it is VLAN 500 and v...
ORIGINAL: ede_pfau set identity-based enableHow do you authenticate
prior to connecting to the SSL VPN portal?? I login as a user belonging
to admin_SSL group.
Thanks for the help. edit 15 set srcintf " wan2" set dstintf " VOIP" set
srcaddr " ALL" set dstaddr " VOIP Lan" set action ssl-vpn set
identity-based enable config identity-based-policy edit 1 set schedule "
always" set groups " admin_SSL" set servic...