index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
1,855 | Security Profiles
Inspecting HTTP3 traffic
HTTP/3 traffic can be inspected on the FortiGate in flow mode inspection.
When using Chrome, the browser may switch the HTTP/3 connection to HTTP/2 when deep
inspection is applied, due to its sensitivity to delays caused by deep inspection.
Example
In this example, a web filte... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,856 | Security Profiles
config firewall policy
edit 1
set utm-status enable
set ssl-ssh-profile "deep-inspection"
set webfilter-profile "flow-webfilter"
set logtraffic all
set nat enable
next
end
4. Access the website using a supported HTTP/3 client, such as Chrome or Firefox. The website is blocked by the
FortiGate.
Using U... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,857 | Security Profiles
The firewall policy must use proxy-based inspection. Either certificate or deep inspection
will work with this feature.
2. In an explicit or transparent web proxy, a proxy-policy can be configured with a risk level. The risk level becomes a
matching criteria for the policy.
Furthermore, the risk score... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,858 | Security Profiles
end
next
end
l Built-in read-only web filter local FortiGuard risk-level definition:
config webfilter ftgd-risk-level
edit "high"
set high 100
set low 91
next
edit "suspicious"
set high 90
set low 71
next
edit "moderate"
set high 70
set low 51
next
edit "low"
set high 50
set low 21
next
edit "trustwor... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,859 | Security Profiles
Examples
The following examples demonstrate applying risk levels in different scenarios.
Two demo URLs are used for the examples:
Demo URL Risk score Default risk level
www.example.com 58 Moderate
www.httpbin.org 46 Low
In the web filter examples, the profile is applied to a firewall policy that utili... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,860 | Security Profiles
The following UTM log can be observed from CLI:
# execute log filter category utm-webfilter
# execute log display
1: date=2024-11-20 time=09:45:19 eventtime=1732124719100876715 tz="-0800" logid="0316013058"
type="utm" subtype="webfilter" eventtype="ftgd_blk" level="warning" vd="vdom1" policyid=1
poluu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,861 | Security Profiles
next
end
end
set log-all-url enable
next
end
The low risk-level is added to the web filter profile, with the action monitor.
When a client accesses www.example.com, the URL is allowed.
The following UTM log can be observed from CLI:
1: date=2024-11-20 time=11:25:55 eventtime=1732130754321650374 tz="-0... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,862 | Security Profiles
end
end
set log-all-url enable
next
end
When a client accesses www.example.com, the URL is blocked.
The following UTM log can be observed from CLI:
1: date=2024-11-20 time=11:58:46 eventtime=1732132726031604734 tz="-0800" logid="0316013058"
type="utm" subtype="webfilter" eventtype="ftgd_blk" level="wa... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,863 | Security Profiles
set logtraffic all
set ssl-ssh-profile "protocols"
set log-http-transaction enable
next
end
When a client accesses www.httpbin.org, the URL is allowed.
Traffic log indicates the traffic matched proxy-policy 1:
# execute log filter category traffic
# execute log display
2: date=2024-11-20 time=14:14:43... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,864 | Security Profiles
duration=0 sentbyte=222 rcvdbyte=0 sentpkt=0 rcvdpkt=0 crscore=30 craction=131072
crlevel="high" msg="Traffic denied because of explicit proxy policy"
Configuration examples
This section includes the following configuration examples:
l Configuring web filter profiles with Hebrew domain names on page 1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,865 | Security Profiles
6. Click OK to save the web filter profile.
7. Edit the web filter profile. The URL in the table has been converted by the FortiGate into Punycode.
In the CLI, Punycode must be used to configure the Hebrew URL.
To configure the web filter profile in the CLI:
config webfilter urlfilter
edit 1
set name ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,866 | Security Profiles
l In flow mode (current configuration), the URL is displayed in Hebrew.
l In proxy mode, the URL is displayed in Punycode.
To verify the logs:
1. Go to Log & Report > Security Events and select the Web Filter card.
2. Select a log and click Details. The format of the Hostname and URL fields depends on... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,867 | Security Profiles
When the log file is downloaded, the hostname in the raw file cannot be displayed. Paste the log into a text
editor (such as Word or Notepad) to view the URL in Hebrew.
# execute log display
2 logs found.
2 logs returned.
1: date=2023-03-20 time=09:43:57 eventtime=1679330638045179264 tz="-0700"
logid=... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,868 | Security Profiles
l In proxy mode, the Hostname is displayed in Hebrew with Punycode in parentheses. The URL is displayed
Punycode.
When the log file is downloaded, the hostname in the raw file is displayed in Punycode.
# execute log display
2 logs found.
2 logs returned.
1: date=2023-03-20 time=09:38:44 eventtime=1679... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,869 | Security Profiles
If a FortiGuard category-based filter is configured in a web filter profile, the same behavior for
replacement messages and logs applies based on the inspection mode.
Configuring web filter profiles to block AI and cryptocurrency
The following FortiGuard web filter categories are available:
l Artifici... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,870 | Security Profiles
config filters
edit 100
set category 100
set action block
next
edit 101
set category 101
set action block
next
edit 52
set category 52
next
end
end
set log-all-url enable
next
end
To verify that the categories are blocked:
1. Apply the web filter profile in a firewall policy.
2. On a device that is co... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,871 | Security Profiles
l Cryptocurrency:
To verify the web filter logs:
1. In the GUI, go to Log & Report > Security Events and click Web Filter.
2. In the CLI, enter the following:
# execute log filter category utm-webfilter
# execute log display
1: date=2023-07-12 time=10:39:18 eventtime=1689183557968026063 tz="-0700"
log... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,872 | Security Profiles
direction="outgoing" msg="URL belongs to a denied category in policy"
ratemethod="domain" cat=100 catdesc="Artificial Intelligence Technology"
Video filter
The video filter profile can be used to filter YouTube videos based on several criteria, including: FortiGuard categories,
video titles, video des... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,873 | Security Profiles
YouTube API key
The YouTube API key is required when filtering by a:
l YouTube video title
l YouTube video description
l YouTube channel in conjunction with filtering based on FortiGuard categories
To configure the YouTube API key in the GUI:
1. Go to Security Profiles > Video Filter and select the Vi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,874 | Security Profiles
To configure a video filter based on FortiGuard categories in the GUI:
1. Create the video filter profile:
a. Go to Security Profiles > Video Filter, select the Video Filter Profile tab, and click Create new.
b. Enter a name (category_filter).
c. Create the filter:
i. In the Filters table, click Creat... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,875 | Security Profiles
2. Create the firewall policy:
config firewall policy
edit 10
set name "client_yt_v4"
set srcintf "port2"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set ssl-ssh-profile "deep-inspecti... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,876 | Security Profiles
Troubleshooting and debugging
To verify if the FortiGuard video filtering license is valid:
# get system fortiguard
fortiguard-anycast : enable
fortiguard-anycast-source: fortinet
protocol : https
port : 443
...
webfilter-license : Contract
webfilter-expiration: Mon Oct 28 2024
...
To verify the WAD w... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,877 | Security Profiles
end='&'
[p:274][s:8754][r:186] wad_vf_extract_video_id(297): str='v=EAyo3_zJj5c', start='v=', end=''
[p:274][s:8754][r:186] wad_vf_extract_video_id(322): video-id: start=2, end=13
[p:274][s:8754][r:186] wad_vf_sync_task_trigger_async_task(1602): extracted vid=EAyo3_zJj5c
ctx=0x7f118502d1f8
[p:274][s:8... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,878 | Security Profiles
Video URL Channel ID
www.youtube.com/channel/<channelid>
<channel-id> indicates the ID for the channel.
www.youtube.com/user/<user-id> Open the page source and locate:
<meta itemprop="channelId" content="<channel-id>">
<channel-id> indicates the channel ID for the user page.
www.youtube.com/watch?v=<... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,879 | Security Profiles
Verifying the configuration
Perform a search from a client for a video on YouTube that falls under the Knowledge category, such as any video from
the Udemy channel. The result is a blocked video. However, searching for a video from the Fortinet YouTube channel
results in an accessible video.
Sample lo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,880 | Security Profiles
c. In the Filters table, click Create new.
d. Configure the filter with the following settings:
i. Set the Type to Title.
ii. Set the Action to Block.
iii. Set the Keyword to test-keyword-match-or.
iv. Click OK.
e. Click OK to save the video filter profile.
2. Apply the video filter in a firewall poli... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,881 | Security Profiles
The YouTube API key must be configured to use this feature. Otherwise, the description filter will not retrieve the video
information and bypass the traffic. See YouTube API key for more information.
Basic configuration
In this example, videos are blocked where the description contains the keyword, AP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,882 | Security Profiles
Sample log:
4: date=2023-11-24 time=16:08:51 eventtime=1700870931146681788 tz="-0800" logid="0351013728"
type="utm" subtype="webfilter" eventtype="unknown" level="warning" vd="vdom1" msg="Video
description is blocked." policyid=1 poluuid="090ca600-83e4-51ee-158a-a920fcf8f892"
sessionid=100211 srcip=10... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,883 | Security Profiles
Configure the video filter keyword list in the CLI:
config videofilter keyword
edit <id>
set name <string>
set match {or | and}
config word
edit <name>
set pattern-type {wildcard | regex}
set status {enable | disable}
next
end
next
end
Example configuration
In this example, two keywords, API and game,... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,884 | Security Profiles
next
end
next
end
Replacement messages displayed in blocked videos
When a user visits a video directly by a URL, a full page replacement message is displayed. When a user loads a video
from the YouTube website (homepage or recommended videos), the page loads and the replacement message is
displayed in... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,885 | Security Profiles
Example 3: blocking the video based on FortiGuard category on YouTube
In this example, the user visited a video on the YouTube website that belongs to a blocked FortiGuard category. The
replacement message is displayed in the video frame.
DNS filter
You can apply DNS category filtering to control user... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,886 | Security Profiles
l External dynamic category domain filtering: allows you to define your own domain category.
l DNS safe search: enforces Google, Bing, and YouTube safe addresses for parental controls.
l Local domain filter: allows you to define your own domain list to block or allow.
l External IP block list: allows ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,887 | Security Profiles
FortiGuard DNS rating service
DNS over TLS connections to the FortiGuard secure DNS server is supported. The CLI options are only available when
fortiguard-anycast is enabled. DNS filtering connects to the FortiGuard secure DNS server over anycast by
default.
To configure DoT to the secure DNS server ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,888 | Security Profiles
Name Enter a unique name for the profile.
Comments Enter a comment (optional).
Redirect botnet C&C requests
to Block Portal
Enable to block botnet website access at the DNS name resolution stage. See
Botnet C&C domain blocking on page 1896 for more details.
Enforce 'Safe Search' on
Google, Bing, YouTu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,889 | Security Profiles
destination, set the netmask to 255.255.255.255.
l Status: select Enable or Disable.
Enabling DNS translation will override matching DNS responses with
translated IPs. See DNS translation on page 1906 for more details.
Options This section includes other options related to the DNS filter.
Redirect Por... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,890 | Security Profiles
Redirecting to default Block Portal
By default, FortiGate redirects traffic to the FortiGuard SDNS block portal at 208.91.112.55, which is owned and hosted
by Fortinet. When opening a blocked destination in the browser, two behaviors may occur:
l When opening a HTTP page, the blocked page is hosted on... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,891 | Security Profiles
sdns-ftgd-err-log {enable
| disable}
Enable/disable FortiGuard SDNS rating error logging (default = enable).
To configure a DNS filter profile in the CLI:
config dnsfilter profile
edit "demo"
set comment ''
config domain-filter
unset domain-filter-table
end
config ftgd-dns
set options error-allow
conf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,892 | Security Profiles
set logtraffic all
set fsso disable
set dnsfilter-profile "demo"
set profile-protocol-options "default"
set ssl-ssh-profile "deep-inspection"
set nat enable
next
end
FortiGuard category-based DNS domain filtering
You can use the FortiGuard category-based DNS domain filter to inspect DNS traffic. This ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,893 | Security Profiles
5. Click OK.
To configure FortiGuard category-based DNS domain filtering in the CLI:
config dnsfilter profile
edit "demo"
set comment ''
config domain-filter
unset domain-filter-table
end
config ftgd-dns
set options error-allow
config filters
edit 2
set category 2
set action monitor
next
edit 7
set ca... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,894 | Security Profiles
set redirect-portal 93.184.216.34
set youtube-restrict strict
next
end
You can use the get webfilter categories command to determine the web filtering
category that corresponds to a given category ID.
Verifying the logs
From your internal network PC, use a command line tool, such as dig or nslookup, t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,895 | Security Profiles
To check the DNS filter log in the GUI:
1. Go to Log & Report > Security Events.
2. Click the DNS Query card name. There are logs for the DNS traffic that just passed through the FortiGate with the
FortiGuard rating for the domain name.
To check the DNS filter log in the CLI:
# execute log filter cate... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,896 | Security Profiles
4. Configure the other settings as needed.
5. Click OK.
To configure botnet C&C domain blocking in the CLI:
config dnsfilter profile
edit "demo"
set comment ''
config domain-filter
unset domain-filter-table
end
config ftgd-dns
set options error-allow
config filters
...
end
end
set log-all-domain enabl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,897 | Security Profiles
#dig canind.co
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 997
;; Flags: qr rd; QUERY: 1; ANSWER: 1; AUTHORITY: 0; ADDITIONAL: 0
;; QUESTION SECTION:
;; canind.co. IN A
;; ANSWER SECTION:
canind.co. 60 IN A 208.91.112.55
;; Received 43 B
;; Time 2019-04-05 09:55:21 PDT
;; From 172.16.95.16@53(... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,898 | Security Profiles
To view the botnet IPDB list in the CLI:
(global) # diagnose sys botnet list 9000 10
9000. proto=TCP ip=103.228.28.166, port=80, rule_id=7630075, name_id=3, hits=0
9001. proto=TCP ip=5.9.32.166, port=481, rule_id=4146631, name_id=7, hits=0
9002. proto=TCP ip=91.89.44.166, port=80, rule_id=48, name_id=... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,899 | Security Profiles
botnetip=98.25.53.166
2: date=2019-04-05 time=11:06:48 logid="1500054000" type="utm" subtype="dns" eventtype="dnsquery" level="information" vd="vdom1" eventtime=1554487606 policyid=1 sessionid=55232
srcip=10.1.100.18 srcport=60510 srcintf="port10" srcintfrole="undefined" dstip=172.16.95.16
dstport=53... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,900 | Security Profiles
4. Configure the other settings as needed.
5. Click OK.
To configure safe search in the CLI:
config dnsfilter profile
edit "demo"
config ftgd-dns
set options error-allow
config filters
edit 2
set category 2
next
...
end
end
set log-all-domain enable
set block-botnet enable
set safe-search enable
set y... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,901 | Security Profiles
To check the DNS filter log in the CLI:
# execute log filter category utm-dns
# execute log display
2 logs found.
2 logs returned.
1: date=2019-04-05 time=14:34:53 logid="1501054804" type="utm" subtype="dns" eventtype="dnsresponse" level="notice" vd="vdom1" eventtime=1554500093 policyid=1 sessionid=6... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,902 | Security Profiles
Domain Type Action
www.fortinet.com Simple Allow
*.example.com Wildcard Redirect to Block Portal
google Reg. Expression Monitor
6. Click OK. The entry appears in the table.
7. In the FortiGuard Category Based Filter table, set General Interest - Business > Search Engines and Portals to
Redirect to Blo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,903 | Security Profiles
set status enable
next
edit 3
set domain "google"
set type regex
set action monitor
set status enable
next
end
config domain-filter
set domain-filter-table 1
end
config ftgd-dns
config filters
edit 23
set category 41
set action block
next
end
end
next
end
Wildcard entries are converted to regular expr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,904 | Security Profiles
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set ssl-ssh-profile "certificate-inspection"
set dnsfilter-profile "demo"
set logtraffic all
set nat enable
next
end
Testing and Verification
On a client computer, perform DNS lookup on the three ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,905 | Security Profiles
type="utm" subtype="dns" eventtype="dns-response" level="warning" vd="root" policyid=3
poluuid="6b80057c-1e76-51ed-c629-5fe117f24362" policytype="policy" sessionid=820019
srcip=192.168.0.10 srcport=59950 srccountry="Reserved" srcintf="port3" srcintfrole="lan"
dstip=8.8.8.8 dstport=53 dstcountry="Unite... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,906 | Security Profiles
In this scenario, the user can access saved bookmarks containing public domain names from both their office computer
on the internal network and their personal computer over the internet.
Before continuing, make sure that the port1 and wan interfaces have been configured with valid IP addresses and so... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,907 | Security Profiles
Field Value
Schedule always
Action ACCEPT
Type Standard
Incoming interface port1
Outgoing interface wan
Source all
Destination all
Service ALL
NAT Enabled
IP pool configuration Use Outgoing Interface Address
DNS Filter Enable and select Reflective DNS
Log allowed traffic All sessions
3. Click OK.
To c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,908 | Security Profiles
set logtraffic all
set nat enable
next
end
To verify the results:
1. Access the internal machine and use the saved bookmarks that contain the public domain name of the internal web
server to access it. This should be successful, and the web server should load correctly. On the FortiGate, this can
be v... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,909 | Security Profiles
To check DNS translation using a command line tool after DNS translation:
# dig www.example.com
;; ->>HEADER<<- opcode: QUERY; status: NOERROR; id: 6736
;; Flags: qr rd ra; QUERY: 1; ANSWER: 1; AUTHORITY: 2; ADDITIONAL: 0
;; QUESTION SECTION:
;; www.example.com. IN A
;; ANSWER SECTION:
www.example.com... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,910 | Security Profiles
To configure DNS service in the GUI:
1. Go to Network > DNS Servers (if this option is not available, go to System > Feature Visibility and enable
DNS Database).
2. In the DNS Service on Interface section, click Create New and select an Interface from the dropdown.
3. For Mode, select Forward to Syste... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,911 | Security Profiles
handle DoT and DoH.
In the following examples, the FortiGate inspects DNS queries made over DoT and DoH to a Cloudflare DNS server. The
DNS filter profile blocks the education category.
To configure DNS inspection of DoT and DoH queries in the GUI:
1. Configure the SSL-SSH profile:
a. Go to Security P... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,912 | Security Profiles
d. Configure the other settings as needed.
e. Click OK.
2. Configure the DNS filter profile:
a. Go to Security Profiles > DNS Filter and click Create New.
b. Enable Redirect botnet C&C requests to Block Portal.
c. Enable FortiGuard Category Based Filter and set the Action for the Education category to... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,913 | Security Profiles
3. Configure the firewall policy:
config firewall policy
edit 1
set srcintf "port1"
set dstintf "port3"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set profile-protocol-options "protocol"
set ssl-ssh-prof... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,914 | Security Profiles
In this query, the FortiGate inspects the DNS query to the Cloudflare DNS server. It replaces the result with the IP of
the FortiGuard block page, which successfully blocks the query.
To query DNS over HTTPS:
1. In your browser, enable DNS over HTTPS.
2. Go to www.ubc.ca. The website is redirected to ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,915 | Security Profiles
3. Configure the remaining settings as required.
4. Click OK.
To configure DoQ in transparent mode in the CLI:
1. Enable QUIC in the ssl-ssh-profile:
config firewall ssl-ssh-profile
edit "protocols"
config dot
set status deep-inspection
set quic inspect
end
next
end
2. Configure a DNS filter profile:
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,916 | Security Profiles
set service "ALL"
set utm-status enable
set inspection-mode proxy
set profile-protocol-options "protocol"
set ssl-ssh-profile "protocols"
set dnsfilter-profile "dnsfilter_fgd"
set logtraffic all
set nat enable
next
end
4. Test the configuration:
On the client, use q to query a FortiGuard category30 do... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,917 | Security Profiles
On the client, use q to query a FortiGuard category30 domain with the FortiGate interface over QUIC. The default
redirect block IP address should be returned:
pc03:~# q www.mcgill.ca @quic://10.1.100.150 --tls-no-verify
2023/08/18 20:05:53 failed to sufficiently increase receive buffer size (was: 208 ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,918 | Security Profiles
next
end
4. Test the configuration:
On the client with HTTP3 support, use q or Curl to query a FortiGuard category30 domain with the Adguard DNS
server or Cloudflare DNS server over QUIC. The default redirect block IP address should be returned:
pc03:~# q www.mcgill.ca --http3 @https://dns.adguard.com... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,919 | Security Profiles
next
end
2. Test the configuration:
On the client with HTTP3 support, use q or Curl to query a FortiGuard category30 domain with the FortiGate
interface over HTTP3. The default redirect block IP address should be returned:
pc03:~# q www.mcgill.ca --http3 @https://10.1.100.150 --tls-no-verify
2023/08/1... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,920 | Security Profiles
Checking the connection between the FortiGate and FortiGuard SDNS server
You need to ensure the FortiGate can connect to the FortiGuard SDNS server. By default, the FortiGate uses DNS over
TLS (DoT, TCP port 853) to connect to the SDNS server. See DNS over TLS and HTTPS on page 307 for more
informatio... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,921 | Security Profiles
To check the DNS rating service license in the CLI:
1. View the DNS settings:
# diagnose test application dnsproxy 3
2. Find the FGD_DNS_SERVICE_LICENSE line and check that the license has not expired:
FGD_DNS_SERVICE_LICENSE:
server=173.243.140.53:853, expiry=2023-10-28, expired=0, type=2
3. Find the... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,922 | Security Profiles
Test level Action
12 Reload secure DNS setting
13 Show hostname cache
14 Clear hostname cache
15 Show SDNS rating cache
16 Clear SDNS rating cache
17 Show DNS debug bit mask
18 Show DNS debug object members
99 Restart the dnsproxy worker
To debug DNS proxy details:
# diagnose debug application dnsprox... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,923 | Security Profiles
l Configuring an application sensor on page 1924
l Application matching signature priority on page 1925
l Basic category filters and overrides on page 1926
l Excluding signatures in application control profiles on page 1930
l Port enforcement check on page 1932
l Protocol enforcement on page 1933
l SS... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,924 | Security Profiles
Allow and Log DNS Traffic The intended behavior is to allow and log DNS traffic. However, to fully enable
logging, configure the following:
1. Within the application sensor profile, create a new Application and Filter
Overrides entry.
2. Set the Action to Monitor.
3. Search for the DNS application, se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,925 | Security Profiles
id: 15832
category: "Social.Media"
cat-id: 23
popularity: 5.low
risk: 3.low
weight: 10
shaping: 0
protocol: 1.TCP, 9.HTTP, 2.UDP, 26.SSL
vendor: 3.Meta
technology: 1.Browser-Based
# get application name status | grep -A10 "app-name: \"SSL\""
app-name: "SSL"
id: 15895
category: "Network.Service"
cat-id... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,926 | Security Profiles
3. If you select the Quarantine action, the Quarantine Duration pane will open. Enter the duration values and click OK.
4. Click OK.
To configure category filters in the CLI:
config application list
edit <name>
config entries
edit <id>
set category <id>
set action {pass | block | reset}
set quarantine... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,927 | Security Profiles
f. Click OK.
3. Add a filter:
a. In the Application and Filter Overrides table, click Create New.
b. For Type, select Filter.
c. Select an Action from the dropdown.
If the action is set to Quarantine, set the duration of the quarantine.
d. In the Filter field, click the + . The Select Entries pane ope... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,928 | Security Profiles
e. Click OK.
4. Click OK.
To configure overrides in the CLI:
config application list
edit <name>
config entries
edit <id>
set protocols <integer>
set risk <integer>
set vendor <id>
set technology <id>
set behavior <id>
set popularity <integer>
set action {pass | block | reset}
set quarantine {none | a... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,929 | Security Profiles
l 0 (network-protocol)
l 1 (browser-based)
l 2 (client-server)
l 4 (peer-to-peer)
behavior <id> Application behavior filter:
l all
l 2 (botnet)
l 3 (evasive)
l 5 (excessive bandwidth)
l 6 (tunneling)
l 9 (cloud)
popularity <integer> Application popularity filter (1 - 5, from least to most popular).
ac... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,930 | Security Profiles
Sample configurations
In the following example, category 23 (social media) is blocked in the entries, and signature 34527 (Instagram) is
excluded from this entry. Traffic to Instagram will pass because the signature is removed from entry 1 and the action of
other-application-action is set to pass.
To ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,931 | Security Profiles
To configure signature exclusion:
config application list
edit "test"
set other-application-action pass
set unknown-application-action pass
set other-application-log enable
set unknown-application-log enable
config entries
edit 1
set category 6
set exclusion 107347980
set action block
next
end
next
en... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,932 | Security Profiles
When an application is configured with an action of Monitor or Allow, when its traffic is
detected on non-standard ports (as defined in FortiGuard application signatures) then
the application will be blocked. An application configured with an action of Block will
have its traffic blocked regardless of... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,933 | Security Profiles
3. Enable Network Protocol Enforcement.
Enforcement entries can be created, edited, or deleted to configure network services on certain ports and determine
the violation action.
4. In the Network Protocol Enforcement table, click Create New.
5. Configure the entry for HTTP:
a. For Port, enter 80.
b. F... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,934 | Security Profiles
To configure protocol enforcement in the CLI:
config application list
edit "protocol-GUI"
set other-application-log enable
set control-default-network-services enable
config default-network-services
edit 1
set port 80
set services http
set violation-action block
next
edit 2
set port 53
set services dn... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,935 | Security Profiles
--depend-on 15832; --depend-on 38468; --require_ssl_di "Yes"; --casi 1; --casi 8; --parent 15832; --app_port
"TCP/443"; --severity info; --status hidden; --service http; --flow from_client; --pattern "/pull?"; --context uri; --no_case; --
pattern ".facebook.com"; --context host; --no_case; --tag set,T... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,936 | Security Profiles
5. Click the Selected tab. In the Application Parameters section, click Create New.
6. Edit the parameter values as needed.
7. Click OK.
8. Add more signatures if needed.
9. Click OK.
To configure an application sensor with multiple parameters in the CLI:
config application list
edit "test"
set other-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,937 | Security Profiles
set application 48885
config parameters
edit 1
config members
edit 1
set name "UnitID"
set value "0:255"
next
edit 2
set name "Address"
set value "0:65535"
next
edit 3
set name "Value"
set value "0,65280"
next
end
next
end
next
edit 2
set category 2 6
next
end
next
end
Application signature dissector ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,938 | Security Profiles
appcat="Operational.Technology" app="RealPort.DNP3_Confirm" incidentserialno=88083404
msg="Operational.Technology: RealPort.DNP3_Confirm," clouduser="34 -> 34" filename="Null"
apprisk="elevated" cloudaction="others"
Domain fronting protection
FortiOS can protect against domain fronting in both explici... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,939 | Security Profiles
level="notice" vd="vdom1" policyid=1 poluuid="01352fb2-1370-51ef-8ac3-c46f77827b80"
policytype="proxy-policy" sessionid=1542161161 transid=1 srcip=10.1.100.77 srcport=41548
srccountry="Reserved" srcintf="port2" srcintfrole="undefined" dstip=3.211.196.247
dstport=443 dstcountry="United States" dstintf=... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,940 | Security Profiles
Control Description
See Tenant control on page 1946 for an example.
UTM bypass For each user activity, bypass further UTM scanning any of the following security
profiles:
l Antivirus
l DLP
l File filter
l Video filter
l Web filter
See UTM bypass on page 1949 for an example.
Administrators can customiz... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,941 | Security Profiles
Privilege control
In this example, logging in to Microsoft Outlook is blocked by the privilege control settings in the inline CASB profile.
To configure an inline CASB profile with privilege control in the GUI:
1. Configure the inline CASB profile:
a. Go to Security Profiles > Inline-CASB and click Cr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,942 | Security Profiles
a. Go to Policy & Objects > Firewall Policy. Edit an existing policy, or create a new one.
b. Set the Inspection Mode to Proxy-based.
c. In the Security Profiles section, enable Inline-CASB and select the outlook_test profile.
d. Set the SSL Inspection profile to one that uses deep inspection.
e. Conf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,943 | Security Profiles
Control.
Sample log:
1: date=2023-08-18 time=16:59:32 eventtime=1692403171962221884 tz="-0700" logid="2500010000"
type="utm" subtype="casb" eventtype="casb" level="warning" vd="vdom1" msg="CASB access was
blocked because it contained banned activity." policyid=6 sessionid=63635 srcip=10.1.100.195
dsti... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,944 | Security Profiles
e. Enable Safe search.
f. Click OK.
2. Configure the firewall policy:
a. Go to Policy & Objects > Firewall Policy. Edit an existing policy, or create a new one.
b. Set the Inspection Mode to Proxy-based.
c. In the Security Profiles section, enable Inline-CASB and select the google_test profile.
d. Set... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,945 | Security Profiles
To configure an inline CASB profile with safe search in the CLI:
1. Configure the inline CASB profile:
config casb profile
edit "google_test"
config saas-application
edit "google"
set safe-search enable
set safe-search-control "strict"
next
end
next
end
2. Configure the firewall policy:
config firewal... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,946 | Security Profiles
To configure an inline CASB profile with tenant control in the GUI:
1. Configure the inline CASB profile:
a. Go to Security Profiles > Inline-CASB and click Create new.
b. Enter a Name, such as microsoft_test.
c. In the SaaS Applications table, click Create new. The Create SaaS Application Rules pane ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,947 | Security Profiles
a. Go to Policy & Objects > Firewall Policy. Edit an existing policy, or create a new one.
b. Set the Inspection Mode to Proxy-based.
c. In the Security Profiles section, enable Inline-CASB and select the microsoft_test profile.
d. Set the SSL Inspection profile to one that uses deep inspection.
e. Co... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,948 | Security Profiles
3. Attempt to log in to Microsoft Office 365 with another account with a different domain.
4. The domain is invalid. The user is unable to log in, and an error message appears: Your network administrator has
blocked access.
Sample log:
1: date=2023-08-18 time=17:09:25 eventtime=1692403765238967943 tz=... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,949 | Security Profiles
To configure an inline CASB profile with UTM bypass in the GUI:
1. Configure the inline CASB profile:
a. Go to Security Profiles > Inline-CASB and click Create new.
b. Enter a Name, such as dropbox_test.
c. In the SaaS Applications table, click Create new. The Create SaaS Application Rules pane opens.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,950 | Security Profiles
h. Click OK to save the bypass UTM profile.
i. Click OK to save the inline CASB profile
2. Configure the firewall policy:
a. Go to Policy & Objects > Firewall Policy. Edit an existing policy, or create a new one.
b. Set the Inspection Mode to Proxy-based.
c. In the Security Profiles section, enable In... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,951 | Security Profiles
next
end
next
end
2. Configure the firewall policy:
config firewall policy
edit 9
set name "casb_test_dropbox"
set srcintf "port1"
set dstintf "port3"
set action accept
set srcaddr "all"
set dstaddr "all"
set schedule "always"
set service "ALL"
set utm-status enable
set inspection-mode proxy
set ssl-s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,952 | Security Profiles
e. Enter the Name (pc4) and Domains (pc4.qa.fortinet.com), then click OK.
f. Select pc4 and click Next.
g. Configure the custom control and action:
i. In the Custom Controls table, Create new. The Create Custom Control pane opens.
ii. Enter a Name, such as pc4-virus_test_replace.
iii. Set Apply when H... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,953 | Security Profiles
ix. Set the Path to /virus.
x. Set the Value to /testweb/testweb.html.
xi. Click OK to save the custom action.
xii. Click OK to save the custom control.
h. Click OK to save the application rule.
i. Click OK to save the inline CASB profile.
2. Configure the firewall policy:
a. Go to Policy & Objects > ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
1,954 | Security Profiles
config casb user-activity
edit "pc4-virus_test_replace"
set application "pc4"
set category other
config match
edit 1
config rules
edit 1
set type path
set match-value "/virus"
next
end
next
end
config control-options
edit "virus_replace_operation"
config operations
edit "virus_replace_operation"
set t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.