FTP Virus Scan Rule

FTP > Scan Rules | Virus Scan Rule

IWSVA can scan FTP traffic for both IPv4 and IPv6 servers based on predefined policies.

For the Proxy Deployment mode, IWSVA supports the deployment scenarios that follow and can auto-transition for FTP, HTTP, and HTTPS traffic between the IPv4 and IPv6 networks when deploying IWSVA as a dual stack network environment. This means the IPv4 client can also access an IPv6 server or an IPv6 client can access an IPv4 host with an IWSVA proxy along with an IPv4 client accessing an IPv4 client and an IPv6 client access IPv4 server.

Proxy Deployment Mode Scanning Scenarios Supported

No.

Client

Server

Supported Y/N

1

IPv4

IPv4

Y

2

IPv6

IPv6

Y

3

IPv4

IPv6

Y

4

IPv6

IPv4

Y

For other supported deployment modes, IWSVA cannot transition between IPv4 and IPv6 networks as the following table shows.

Other Deployment Mode Scanning Scenarios Supported

No.

Client

Server

Supported Y/N

1

IPv4

IPv4

Y

2

IPv6

IPv6

Y

3

IPv4

IPv6

N

4

IPv6

IPv4

N

 

The FTP virus scanning settings are similar to the HTTP scanning settings, with two differences:

 

Click Enable FTP Scanning at the top of the page to have IWSVA check incoming and/or outgoing FTP traffic for viruses, malicious code, and other Internet threats. Note: Disabling FTP scanning will not interrupt Internet traffic.

/var/iwss/quarantine

You can change the location in the Administration > IWSVA Configuration > Quarantine Management page.

See also