0% found this document useful (0 votes)
50 views

Laboratorio 8

The document discusses configuring web filtering on FortiGate using FortiGuard categories. It provides steps to configure a category-based web filter security profile, apply the profile to a firewall policy, test the filter, create a web rating override, and configure an authenticate action.

Uploaded by

manuteoihu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
50 views

Laboratorio 8

The document discusses configuring web filtering on FortiGate using FortiGuard categories. It provides steps to configure a category-based web filter security profile, apply the profile to a firewall policy, test the filter, create a web rating override, and configure an authenticate action.

Uploaded by

manuteoihu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Exercise 1: Configuring FortiGuard

Web Filtering
To configure FortiGate for web filtering based on FortiGuard categories, you must make
sure that FortiGate has a valid FortiGuard security subscription license. The license
provides the web filtering capabilities necessary to protect against inappropriate websites.

Then, you must configure a category-based web filter security profile on FortiGate, and
apply the security profile in a firewall policy to inspect the HTTP traffic.

Finally, you can test different actions that FortiGate has taken, according to the website
rating.

Review the FortiGate Settings


You will review the inspection mode and license status according to the uploaded settings.
You will also list the FortiGuard Distribution Servers (FDS) that FortiGate uses to send the
web filtering requests.

To review the restored settings on FortiGate


1. Connect to the Local-FortiGate GUI, and then log in with the username admin and
password password.

2. On the Dashboard, locate the Licenses widget, and then hover over Web Filter to
confirm that the service is licensed and active.

You should see information similar to the following example:

Because of the reboot following the


restoration of the configuration file, the
web filter license status may
be Unavailable. In this case, navigate
to System > FortiGuard. In
the Filtering section, click Test
Connectivity to force an update, and
then click OK to confirm. You can
confirm, at the same time, that Web
Filter cache is enabled.

3. Click Policy & Objects > Firewall Policy.

4. Double-click the Full_Access policy to edit it.

5. Verify the Inspection Mode setting.

Notice that the default inspection mode is set to Flow-based.

6. In the Inspection Mode field, select Proxy-based.

7. Click OK.

Determine Web Filter Categories


To configure web filter categories, you must first identify how FortiGuard Web Filtering
categorizes specific websites.

To determine web filter categories


1. On the Local-Client VM, open a new browser tab, and then go
to https://www.fortiguard.com/webfilter .
2. Use the Web Filter Lookup tool to search for the following URL:

www.facebook.com
This is one of the websites you will use later to test your web filter.

As you can see, Facebook is listed in the Social Networking category.

3. Use the Web Filter Lookup tool again to find the web filter category for the
following websites:

 www.skype.com
 www.ask.com
 www.bing.com

You will test your web filter using these websites also.

The following table shows the category assigned to each URL, as well as the action you will
configure FortiGate to take based on your web filter security profile:

Website Category Action

www.facebook.co Social Block


m Networking

www.skype.com Internet Warning


Telephony

www.bing.com Search Allow


Engines and
Portals

www.ask.com Search Allow


Engines and
Portals

Configure a FortiGuard Category-Based


Web Filter
You will review the default web filtering profile, and then configure the FortiGuard category-
based filter.

To configure the web filter security profile


1. Return to the Local-FortiGate GUI, and then click Security Profiles > Web Filter.

2. Double-click the default web filter profile to edit it.


3. Verify that FortiGuard Category Based Filter is enabled.

You can click + to expand a


category or - to collapse a
category.

4. Review the default actions for each category.

Category Action

Local Disable
Categories

Potentially Block: Extremist Group


Liable
Allow: all other subcategories
Category Action

Tip: Expand Potentially


Liable to view the
subcategories.

Adult/Mature Block
Content

Bandwidth Allow
Consuming

Security Risk Block

General Interest Allow


- Personal

General Interest Allow


- Business

Unrated Block

5. Expand General Interest - Personal to view the subcategories.

6. Right-click Social Networking, and then select Block.

7. Expand Bandwidth Consuming to view the subcategories.

8. Right-click Internet Telephony, and then select Warning.


The Edit Filter window opens, which allows you to modify the warning interval.

9. Keep the default setting of 5 minutes, and then click OK.

10. Click OK.

Apply the Web Filter Profile to a Firewall


Policy
Now that you have configured the web filter profile, you must apply this security profile to a
firewall policy in order to start inspecting web traffic.

You will also enable the logs to store and analyze the security events that the web traffic
generates.

Take the Expert Challenge!


On the Local-FortiGate GUI, apply the web
filter profile to the
existing Full_Access firewall policy. Make
sure that logging is also enabled and set
to Security Events.

If you require assistance, or to verify your


work, use the step-by-step instructions that
follow.

After you complete the challenge, see Test


the Web Filter on page 1.

To apply a security profile in a firewall policy


1. Continuing on the Local-FortiGate GUI, click Policy & Objects > Firewall Policy.

2. Double-click the Full_Access policy to edit it.

3. In the Security Profiles section, enable Web Filter, and then select default.

4. Hover over the warning sign that appears beside the SSL Inspection field.

The message should be similar to the following example:

5. In the SSL Inspection field, select certification-inspection.

Because web filtering requires


URL information and does not
inspect the full payload, you can
select certification-inspection i
nstead of deep-inspection.

6. Under Log Allowed Traffic, make sure that Security Events is selected.

7. Keep all other default settings, and then click OK.

Test the Web Filter


You will test the web filter security profile you configured for each category.

To test the web filter


1. On the Local-FortiGate CLI, log in with the username admin and
password password.

2. Enter the following command to verify the web filter status:

get webfilter status


The get webfilter status and diagnose debug rating commands show the list of FDS
that FortiGate uses to send web filtering requests. In normal operations, FortiGate sends
the rating requests only to the server at the top of the list. Each server is probed for round-
trip time (RTT) every 2 minutes.

Stop and think!

Why does only one IP address from your


network appear in the server list?

Your lab environment uses a FortiManager


at 10.0.1.241, which is configured as a
local FDS. It contains a local copy of the
FDS web rating database.

FortiGate sends the rating requests to


FortiManager instead of to the public FDS.
For this reason, the output of the command
lists the FortiManager IP address only.

3. On the Local-Client VM, open a new browser tab, and then go


to www.facebook.com.

A warning appears, according to the predefined action for this website category.
4. Open a new browser tab, and then go to www.skype.com.

A warning appears, according to the predefined action for this website category.
5. Click Proceed to accept the warning and access the website.

6. Open a new browser tab, and then go to www.bing.com.

This website appears because it belongs to the Search Engines and Portals category,
which is set to Allow.

7. Close the Local-Client VM browser tabs.

Create a Web Rating Override


You will override the category for www.bing.com.

To create a web rating override


1. Return to the Local-FortiGate GUI, and then click Security Profiles > Web Rating
Overrides.
2. Click Create New, and then configure the following settings:

Field Value

URL www.bing.com

Category Security Risk

Sub-Category Malicious Websites

3. Click OK.

Test the Web Rating Override


You will test the web rating override you created in the previous procedure.

To test the web rating override


1. On the Local-Client VM, open a new browser tab, and then try to access
the www.bing.com website again.

The website is blocked, and it matches a local rating instead of a FortiGuard rating.
Stop and think!

Why is the website www.bing.com blocked?

The web rating override changes the


category. In the default web profile applied
in the firewall policy, the Malicious
Websites category is set to Block. As a
consequence, the website www.bing.com is
now blocked.

Configure an Authenticate Action


You will set the action for the Malicious Websites FortiGuard category to Authenticate.
You will then define a user in order to test the authenticate action.

To set up the authenticate action


1. Continuing on the Local-FortiGate GUI, click Security Profiles > Web Filter.

2. Double-click the default web filter profile to edit it.

3. Under FortiGuard Category Based Filter, expand Security Risk, right-


click Malicious Websites, and then select Authenticate.

The Edit Filter window opens, which allows you to modify the warning interval and select
the user groups.

4. Configure the following settings:

Field Value

Warning Interval 5 minutes

Selected User Groups Override_Permissions

5. Click OK.

6. Click OK.

For the purpose of this


lab, Override_Permissions is a
predefined user group. To
review the user groups,
click User &
Authentication > User
Groups.

To create a user
1. Continuing on the Local-FortiGate GUI, click User & Authentication > User
Definition.

2. Click Create New.

3. In the User Type field, select Local User.

4. Click Next, and then configure the following settings:


Field Value

Username student

Password fortinet

5. Click Next.

6. Click Next.

7. Enable User Group, and then select Override_Permissions.

8. Click Submit.

The student user is created.

To test the web rating override


1. On the Local-Client VM, open a new browser tab, and then try to
access www.bing.com.

A warning appears. Notice that it is a different message from the one that appeared before.
2. Click Proceed.

You might receive a certificate


warning at this stage. This is
normal and is the result of using
a self-signed certificate. Accept
the warning message to
proceed with the remainder of
the procedure (click Advanced,
and then click Accept the Risk
and Continue).

3. Enter the following credentials:


Field Value

Username student

Password fortinet

4. Click Continue.

The www.bing.com website now displays correctly.

5. Close the Local-Client VM browser tabs.

Exercise 2: Configuring Static URL


Filtering
In this exercise, you will configure a static URL filter and apply the security profile to a
firewall policy in flow-based inspection mode. You will then review the web filter logs.

Set Up the Static URL Filter in Flow-Based


Inspection Mode
You will create a static URL filter entry and change the inspection mode to flow-based.

To create a static URL filter


1. Connect to the Local-FortiGate GUI, and then log in with the username admin and
password password.

2. Click Security Profiles > Web Filter.

3. Double-click the default web filter profile to edit it.

4. In the Static URL Filter section, enable URL Filter.

5. Click Create New, and then configure the following settings:

Field Value

URL www.bing.com

Type Simple

Action Block
Field Value

Status Enable

6. Click OK.

Your configuration should match the following example:

7. Click OK.

To change the inspection mode to flow-based


1. Continuing on the Local-FortiGate GUI, click Security Profiles > Web Filter.

2. Double-click the default web filter profile to edit it.

3. In the Feature set field, select Flow-based.

4. Click OK.

5. Click Policy & Objects > Firewall Policy.

6. Double-click the Full_Access policy to edit it.

7. In the Inspection Mode field, select Flow-based.

8. Click OK.

To test the static URL filter


1. On the Local-Client VM, open a new browser tab, and then try to
access www.bing.com.

A warning appears. Notice that it is a different message from the one that appeared before.

Stop and think!

Why is the replacement


message different?

FortiGate applies the static URL


filter before the FortiGuard
category filter.
The www.bing.com URL
matches the URL filter pattern
and therefore is now blocked,
and FortiGate displays the
corresponding URL filter
message.

To review the web filter logs


1. Return to your browser tab where you are logged in to the Local-FortiGate GUI, and
then click Log & Report > Security Events.

2. Under Summary, click Web Filter.

You should see information similar to the following example:

Stop and think!

Why is the first log entry for


the www.bing.com website
defined as blocked?

Initially,
the www.bing.com website has
the category Search Engines
and Portals, which was set
to Allow and does not generate
a security log.

To allow a website and


generate a security log at the
same time, you must set the
category to Monitor.

Then, according to the


logs, http://www.bing.com is
blocked, but after you
clicked Proceed and
authenticated, the logs show a
different action: passthrough.

Remember that you overrode


the Search Engines and
Portals category to Malicious
Websites, which was set
to Block, and then
to Authenticate.

3. Double-click a log entry with an empty category.

You should see information similar to the following example:

Stop and think!

Why is the category field


empty?

Because the website is blocked


by the static URL filter,
FortiGuard does not apply the
FortiGuard web rating, and
does not provide the category.

You might also like