1st here's the default AV profile on a typical firewall.
When the AVprofile has detected a virus it will throw a similar formatted log_message
You can test both HTTP and HTTPS when you have ssl-inspection enabled.
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjy8tL2H5MsYVSQKInVvtIKqJ6xj1tYbr4UlItHgMeOr3Rn3gzKECCo8sjJcIhsLhOKMzLwG9IjEhpqnZa8pm9tYa9zAIR6EU1665nopywjnBteiZs2xGoU4P79QVoyWqPT-cHOyLN8Bok/s400/NOTE.png)
Note, this is a sure way to test that your ssl-inspection is also working btw
If you have NO ssl-inspection profile enable, the fortigate-firewall will let you download the EICAR test.file over a secure protocol like HTTPs with no warning. Here's a source for text and zip or double-zip files.
http://www.rexswain.com/eicar.html
e.g ( with no ssl-inspection the EICAR test file was downloaded )
Security best practice mandate you should have AV enabled and ssl-inspection profile for protecting local lan users if end-point protection has not been installed.
Here's how a firewall policy will look like from the CLI & that's enabled for AV-profile and with SSL inspections.
A feedback page will be displayed to the end-user who hit's the policy and a simple link provided if he/she want to investigate what and why the content was blocked in regards to AV.
( https test EICAR file source )
https://secure.eicar.org/eicar.com
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-B3xPAbNSa2zCCyEOFmbwsJc2_aFHJnAxXbJgHuCU7nE4N-H-46Z6FjaSCQicJG7oRqwKycUw2pIxIxMEE7bHKnbaVnSKSEqxjdw_VnKmLMe5ocbGSoe1LB2VVw8Rd1L8acE0Qd2jPmc/s400/note.png)
example
Ken Felix
![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYa857d2LFTWbnykeszDF7qcmmlLr0QGtwEAa58XtpyhZNmNSFY-ZE4l6z2Fqrby-TZ-2W5jF0ntf-p7LiwyMNpz1OKwiubJGWkH0TJojWaJWBX6k2I2kOTRys4F7bXhvxgKRfWfBUVSw/s400/Screen+Shot+2016-12-25+at+11.47.40+PM.png)
NSE ( network security expert) and Route/Switching Engineer
kfelix -----a----t---- socpuppets ---dot---com
^ ^
=( @ @ )=
o
/ \
No comments:
Post a Comment