FortiGate

This documentation is based on FortiGate 5.4.3 documentation using web-based manager and CLI. For different version of FortiGate or missing information, refer to FortiGate user guides.

Configuration via Web-Based Manager

Enabling ICAP feature

ICAP does not appear by default in the web-based manager, it has to be enabled by going to System → Feature Select and enabling ICAP. You may need to refresh the page in order to see the changes.

Adding ICAP server and profile

  1. Add ICAP server
    1. Select Security Profiles → ICAP Servers.
    2. Create new or edit an existing entry.
      1. The IP address and port should be the ones used by MetaDefender ICAP Server
  1. Add ICAP profile
    1. Select Security Profiles → ICAP.
    2. Create new or edit an existing entry.
    3. Select the 'Enable Request Processing' check-box, select your server's name from the drop-down list and in the 'Path' field, type in 'OMSScanReq-AV'.
    4. Select the 'Enable Response Processing' check-box, select your server's name from the drop-down list and in the 'Path' field, type in 'OMSScanResp-AV'.
    5. Apply the changes.
  1. Apply the ICAP profile in your policy/policies
    1. Select Policy&Objects → IPv4 Policy | Explicit Proxy Policy.
    2. Create new or edit an existing policy
    3. In the section 'Security Profiles', switch on ICAP and select the previously created profile.

Configuration via CLI

  1. Add ICAP server
Copy

The example shown above in the web-based manager would look like this in the CLI:

Copy
  1. Add ICAP profile
Copy

The example shown above in the web-based manager would look like this in the CLI:

Copy
  1. Apply the ICAP profile policy (policy can be replaced by explicit-proxy-policy when setting ICAP for an Explicit Proxy Policy)
Copy

The example shown above in the web-based manager would look like this in the CLI:

Copy

If you want to disable the ICAP profile for a given policy you should write

Copy

Scanning HTTPS content

To be able to inspect and scan SSL/SSH traffic you have to enable it in Fortigate. After enabling this option you should download the certificate used by Fortigate and install/import it to the browsers which communicate with Fortigate. Otherwise you might see SSL/security related notifications or errors, or even not working web pages.

The certificate can be downloaded under Security Profiles→ SSL/SSH Inspection

Enable SSL inception via GUI

  1. Navigate to Policy&Objects and select the policy you would like to enable SSL inception to (for example an Explicit Proxy Policy)
  1. In the Edit page of the selected policy locate the Security Profiles section
  2. Turn SSL/SSH Inspection on and set it to deep-inspection

Enable SSL inspection via CLI

The steps shown above would like this via CLI:

Copy

Resources

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard