Understanding HTTP Scanning
If antivirus scanning is enabled for Hypertext Transfer Protocol (HTTP) traffic in a content security profile, TCP traffic to defined HTTP service ports (generally port 80) is monitored. For HTTP traffic, the security device scans both HTTP responses and requests (get, post, and put commands).
![]() | Note: For HTTP antivirus scanning, both HTTP 1.0 and 1.1 are supported. If the protocol version is HTTP 0.x , the antivirus scanner attempts to scan the traffic. Unknown protocols are bypassed. For example, some application protocols use HTTP as the transport but do not comply with HTTP 1.0 or 1.1. These are considered unknown protocols and are not scanned. |
This is a general description of how HTTP traffic is intercepted, scanned, and acted upon by the antivirus scanner:
- An HTTP client sends an HTTP request to a webserver or a webserver responds to an HTTP request.
- The security device intercepts the request and passes the data to the antivirus scanner, which scans it for viruses.
- After completing the scan, the device follows one
of two courses:
- If there is no virus, the device forwards the request to the webserver.
- If there is a virus, the device drops the request and sends an HTTP message reporting the infection to the client.
With script-only scanning, the input object is a script file. It can be JavaScript, VBScript, mIRC script, bat scripts (DOS bat files) and other text scripts. The engine matches the input content only with signatures for script files. Script scanning is applicable only for HTML content over the HTTP protocol. There are two criteria for this scan-type. First, the content-type field of this HTML document must be text or HTML. Second, there is no content encoding in the HTTP header. If those two criteria are met, an HTML parser is used to parse the HTML document.
Related Topics
Junos OS Feature Support Reference for SRX Series and J Series Devices
Hide Navigation Pane
Show Navigation Pane
Download
SHA1
