Can I block IM by FortiGate firewalls

本文介绍如何使用FortiGate设备进行即时通讯(IM)应用程序的管理,包括阻止特定版本的IM软件、通过入侵保护签名阻止未列出的应用程序、查看当前连接的IM用户、设置带宽限制等。此外还涉及了日志记录、虚拟域配置等内容。

摘要生成于 C知道 ,由 DeepSeek-R1 满血版支持, 前往体验 >

You can use the CLI command config imp2p old-version to block older IM versions than the following at Fortios 3.0:

  • MSN 6.0
  • ICQ 4.0
  • AIM 5.0
  • Yahoo 6.0

For details see the FortiGate CLI Reference.

How can I block IM applications that are not mentioned above?

You can block IM applications such as QQ and Google Talk by Intrusion Protection sigantures or using custom signatures.

To block these applications, go to Intrusion Protection > Signature > Protocol Detection. Select the blue arrow for im_decoder to expand the list. Select Edit to change the settings.

What is the maximum number of supported IM users?

The number varies on different FortiGate models. See the Fortinet Knowledge Center article FortiGate Maximum Values Matrix. Note that the maxumum values only apply to IM management, not to AV/file blocking.

How can I know who are the current connected IM users?

You can view the current users at IM/P2P > User > Current Users.

5. Why can't I block an IM user logon?

Changes to IM protection profile options while IM users are logged in, will take effect only upon their next logon. You cannot disconnect currently logged-on users by enabling logon blocking.

Can I block IM users that use the HTTP port or other non-standard port to get around the Firewall?

Yes. You can enable "Inspect Non-Standard port" on the protection profile.

What if a virtual domain is used? Is IM virtualized?

You can only configure content profiles and IM settings in the global configuration. You can apply protection profiles in virtual dommains, but not create or modify them. Therefore, IM is "virtualized".

Can I enforce that my IM users use consistent versions that are patched against known vulnerabilities?

FortiGate devices do not perform patch or application management capabilities.

Will I be able to log IM transaction infomation?

Yes, you can view IM transaction infomation within the content log. The FortiGate unit saves content logs to a FortiAnalyzer unit. You can view IM violations in the logs by going to Log&Report > Log Access and selecting IM/P2P from the Log Type list.

Can I log IM chat information and its limitation?

Yes, by enabling "Archive full IM chat info to FortiAnalyzer" in the protection profile.

Can I enforce schedules for IM usage?

Yes, by using firewall policies.

How can I protect my IM users against latest possible attacks?

Ensure you have a FortiGuard sub***ion to automatically receive IPS updates. Go to Intrusion Protection > Signature > Predefined. Select the blue arrow for IM and ensure that the signatures are enabled.

Can I manage Skype users?

Skype is a P2P application and can only be managed as such.

What is rate limit for?

Use the Rate limit to block or limit the amount of bandwidth consumed by P2P protocols, and more effectively manage limited Internet resources.

Can I block P2P applications that are not listed?

Go to Intrusion Protection > Signature > Protocol Decoder. Select the blue arrow for p2p_decoder to expand the listing. You can also create custom signatures. 

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值