firewall : profile-protocol-options : config nntp
config nntp
Configure NNTP protocol options.
ports <port_number_list>
Enter a space-separated list of port numbers to scan for NNTP content.
inspect-all {disable | enable}
Enable to monitor all ports for the NNTP protocol. If you enable this option you can’t select a port.
options { no‑content‑summary | oversize | splice}
Select one or more options apply to NNTP sessions. To select more than one, enter the option names separated by a space.
no-content-summary — do not add content information from the dashboard.
oversize — block files that are over the file size limit.
splice — simultaneously scan a file and send it to the recipient. If the FortiGate unit detects a virus, it prematurely terminates the connection.
oversize-limit <size_int>
Enter the maximum in-memory file size that will be scanned, in megabytes. If the file is larger than the oversize-limit, the file is passed or blocked depending on whether oversize is a selected NNTP option. The maximum file size for scanning in memory is 10% of the FortiGate unit’s RAM.
scan-bzip2 {enable | disable}
Enable to allow the antivirus engine to scan the contents of bzip2 compressed files. Requires antivirus engine 1.90 for full functionality. Bzip2 scanning is extemely CPU intensive. Unless this feature is required, leave scan-bzip2 disabled.
status {enable | disable}
Enable or disable NNTP protocol inspection.
uncompnestlimit <depth_int>
Set the maximum number of archives in depth the AV engine will scan with nested archives. The limit is from 2 to 100. The supported compression formats are arj, bzip2, cab, gzip, lha, lzh, msc, rar, tar, and zip. Bzip2 support is disabled by default.
uncompsizelimit <MB_int>
Set the maximum uncompressed file size that can be buffered to memory for virus scanning. Enter a value in megabytes between 1 and the maximum oversize threshold. Enter “?” to display the range for your FortiGate unit. Enter 0 for no limit (not recommended).