Overview

This article covers how to configure antivirus on Versa devices and the related CLI commands to validate and troubleshoot AV issues.


Section 1 — Configuration

To configure antivirus on Versa devices, refer to:


Section 2 — Troubleshooting

Step 1 — Validate the Configuration from CLI

admin@CPE01-cli> show configuration orgs org-services Provider security profiles av Block_Compressed_Files | display set

set orgs org-services Provider security profiles av Block_Compressed_Files lef-profile-default true
set orgs org-services Provider security profiles av Block_Compressed_Files file-type [ 7zip tar zip ]
set orgs org-services Provider security profiles av Block_Compressed_Files action deny
set orgs org-services Provider security profiles av Block_Compressed_Files protocol [ FTP HTTP ]

Verify the following:

  • The protocol, file extension, and direction in the traffic matches the AV profile configuration.
  • The correct AV profile is called in the rule.
  • For SSL traffic, an SSL decryption profile must be configured on the device.
  • For FTP traffic, FTP ALG should be enabled.

Step 2 — Check Session Details

Confirm the policy being matched and check for drop packets/modules:

show orgs org org-name sessions extensive | select source-ip x.x.x.x | select destination-ip y.y.y.y | match-all

Step 3 — Validate Malware Logs on Analytics

Check if there are any events logged for Antivirus in the Malware logs. You need to have the LEF profile configured on the AV profile for logs to be sent to Analytics.

Step 4 — Check AV Profile Statistics

show orgs org-services org-name security profiles av statistics predefined-profile name
show orgs org-services org-name security profiles av statistics user-defined-profile name

Example output:

admin@CPE01-cli> show orgs org-services Provider security profiles av statistics predefined-profile "Scan Email Traffic"

 av-profile-hit-cnt         3
 av-action-allow-cnt        1
 av-action-alert-cnt        0
 av-action-reject-cnt       0
 av-action-block-cnt        2
 av-action-on-disk-full-cnt 0
 av-file-in-queue-cnt       0
 av-eof-rcvd-cnt            0
 av-flow-bypass-cnt         0
 av-filetype-mismatch-cnt   0

            Flows      Flows      Num ctx
 Protocol   Blocked    Allowed    switches
 ---------  -------    -------    --------
 http           2           1           0
 ftp            0           0           0
 smtp           0           0           0
 imap           0           0           0
 pop3           0           0           0
 mapi           0           0           0
 smb            0           0           0

Look for the flows blocked under the respective protocol as well as the block count for the relevant file type.

Step 5 — Clear AV Cache (False Positives)

If the file is not malicious and is being marked as a false positive, check the cache hit count and clear the AV cache:

vsh connect vsmd
show av cache-db statistics
clear av cache-db entries

Step 6 — Check Disk Space and Memory

shell
df -kh

If there are high memory alarms, refer to: How to Troubleshoot High Memory Issues on VOS Device

Step 7 — Check SPACK and AV Version

show security security-package information
show security av information

Example output:

admin@CPE01-cli> show security av information
                   REF      APPLIED
VERSION       FLAVOR  VERSION  VERSIONS
-----------------------------------------
201305081923  Full    -        -

Step 8 — Enable AV Debug Logs

configure
set debug av all-flags level all send to file name /var/log/versa/av.log
commit

Caution: Run this only in the presence of TAC and for a brief period. Delete the debug configuration immediately after to avoid CPU/memory issues.