0% found this document useful (0 votes)
94 views19 pages

LAB 08 Web Filtering

Fortigate Labs 7.4

Uploaded by

hedilon740
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views19 pages

LAB 08 Web Filtering

Fortigate Labs 7.4

Uploaded by

hedilon740
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Lab 8: Web Filtering

Sumário
Lab 8: Web Filtering ................................................................................................................................... 3
Objectives.......................................................................................................................................... 3
Exercise 1: Configuring FortiGuard Web Filtering....................................................................................... 4
Review the FortiGate Settings .............................................................................................................. 4
To review the restored settings on FortiGate .......................................................................................... 4
Determine Web Filter Categories ......................................................................................................... 5
Configure a FortiGuard Category-Based Web Filter................................................................................ 7
Apply the Web Filter Profile to a Firewall Policy ...................................................................................... 9
Test the Web Filter ............................................................................................................................ 10
Create a Web Rating Override ............................................................................................................ 11
Test the Web Rating Override ............................................................................................................. 12
Configure an Authenticate Action ...................................................................................................... 13
To create a user ................................................................................................................................ 13
Exercise 2: Configuring Static URL Filtering ............................................................................................ 16
Set Up the Static URL Filter in Flow-Based Inspection Mode ................................................................. 16
To review the web filter logs ............................................................................................................... 18

2
Lab 8: Web Filtering
In this lab, you will configure one of the most used security profiles on FortiGate: web filter. This includes
configuring FortiGuard category-based and static URL filters, applying the web filter profile in a firewall policy,
testing the configuration, and performing basic troubleshooting.

Objectives
• Configure web filtering on FortiGate

• Apply the FortiGuard category-based option for web filtering

• Apply the static URL option for web filtering

• Troubleshoot the web filter

• Read and interpret web filter log entries

Time to Complete

Estimated: 30 minutes

LAB-8 > Web Filtering

3
Exercise 1: Configuring FortiGuard Web Filtering
To configure FortiGate for web filtering based on FortiGuard categories, you must make sure that FortiGate has
a valid FortiGuard security subscription license. The license provides the web filtering capabilities necessary to
protect against inappropriate websites.

Then, you must configure a category-based web filter security profile on FortiGate, and apply the security
profile in a firewall policy to inspect the HTTP traffic.

Finally, you can test different actions that FortiGate has taken, according to the website rating.

Review the FortiGate Settings


You will review the inspection mode and license status according to the uploaded settings. You will also list the
FortiGuard Distribution Servers (FDS) that FortiGate uses to send the web filtering requests.

To review the restored settings on FortiGate


1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.

2. On the Dashboard, locate the Licenses widget, and then hover over Web Filter to confirm that the
service is licensed and active.

You should see information similar to the following example:

Because of the reboot following the restoration of the configuration file, the web
filter license status may be Unavailable. In this case, navigate
to System > FortiGuard. In the Filtering section, click Test Connectivity to
force an update, and then click OK to confirm. You can confirm, at the same
time, that Web Filter cache is enabled.

3. Click Policy & Objects > Firewall Policy.

4. Double-click the Full_Access policy to edit it.

5. Verify the Inspection Mode setting.

4
Notice that the default inspection mode is set to Flow-based.

6. In the Inspection Mode field, select Proxy-based.

7. Click OK.

Determine Web Filter Categories


To configure web filter categories, you must first identify how FortiGuard Web Filtering categorizes specific
websites.

To determine web filter categories


1. On the Local-Client VM, open a new browser tab, and then go to https://www.fortiguard.com/webfilter.

2. Use the Web Filter Lookup tool to search for the following URL:

www.facebook.com

This is one of the websites you will use later to test your web filter.

As you can see, Facebook is listed in the Social Networking category.

5
3. Use the Web Filter Lookup tool again to find the web filter category for the following websites:

• www.skype.com

• www.ask.com

• www.bing.com

You will test your web filter using these websites also.

The following table shows the category assigned to each URL, as well as the action you will configure FortiGate
to take based on your web filter security profile:

Website Category Action

www.facebook.com Social Networking Block

www.skype.com Internet Telephony Warning

www.bing.com Search Engines and Portals Allow

www.ask.com Search Engines and Portals Allow

6
Configure a FortiGuard Category-Based Web Filter
You will review the default web filtering profile, and then configure the FortiGuard category-based filter.

To configure the web filter security profile


1. Return to the Local-FortiGate GUI, and then click Security Profiles > Web Filter.

2. Double-click the default web filter profile to edit it.

3. Verify that FortiGuard Category Based Filter is enabled.

You can click + to expand a category or - to collapse a category.

4. Review the default actions for each category.

Category Action

Local Categories Disable

Potentially Liable Block: Extremist Group

Allow: all other subcategories

Tip: Expand Potentially Liable to


view the subcategories.

Adult/Mature Content Block

7
Category Action

Bandwidth Consuming Allow

Security Risk Block

General Interest - Personal Allow

General Interest - Business Allow

Unrated Block

5. Expand General Interest - Personal to view the subcategories.

6. Right-click Social Networking, and then select Block.

7. Expand Bandwidth Consuming to view the subcategories.

8. Right-click Internet Telephony, and then select Warning.

The Edit Filter window opens, which allows you to modify the warning interval.

9. Keep the default setting of 5 minutes, and then click OK.

10. Click OK.


8
Apply the Web Filter Profile to a Firewall Policy
Now that you have configured the web filter profile, you must apply this security profile to a firewall policy in
order to start inspecting web traffic.

You will also enable the logs to store and analyze the security events that the web traffic generates.

Take the Expert Challenge!

On the Local-FortiGate GUI, apply the web filter profile to the


existing Full_Access firewall policy. Make sure that logging is also enabled and
set to Security Events.

If you require assistance, or to verify your work, use the step-by-step instructions
that follow.

After you complete the challenge, see Test the Web Filter on page 1.

To apply a security profile in a firewall policy


1. Continuing on the Local-FortiGate GUI, click Policy & Objects > Firewall Policy.

2. Double-click the Full_Access policy to edit it.

3. In the Security Profiles section, enable Web Filter, and then select default.

4. Hover over the warning sign that appears beside the SSL Inspection field.

The message should be similar to the following example:

5. In the SSL Inspection field, select certification-inspection.

Because web filtering requires URL information and does not inspect the full
payload, you can select certification-inspection instead of deep-inspection.

6. Under Log Allowed Traffic, make sure that Security Events is selected.

7. Keep all other default settings, and then click OK.

9
Test the Web Filter
You will test the web filter security profile you configured for each category.

To test the web filter


1. On the Local-FortiGate CLI, log in with the username admin and password password.

2. Enter the following command to verify the web filter status:

get webfilter status

The get webfilter status and diagnose debug rating commands show the list of FDS that FortiGate uses to send
web filtering requests. In normal operations, FortiGate sends the rating requests only to the server at the top of
the list. Each server is probed for round-trip time (RTT) every 2 minutes.

Stop and think!

Why does only one IP address from your network appear in the server list?

Your lab environment uses a FortiManager at 10.0.1.241, which is configured as


a local FDS. It contains a local copy of the FDS web rating database.

FortiGate sends the rating requests to FortiManager instead of to the public FDS.
For this reason, the output of the command lists the FortiManager IP address
only.

3. On the Local-Client VM, open a new browser tab, and then go to www.facebook.com.

A warning appears, according to the predefined action for this website category.

4. Open a new browser tab, and then go to www.skype.com.

A warning appears, according to the predefined action for this website category.

10
5. Click Proceed to accept the warning and access the website.

6. Open a new browser tab, and then go to www.bing.com.

This website appears because it belongs to the Search Engines and Portals category, which is set to Allow.

7. Close the Local-Client VM browser tabs.

Create a Web Rating Override


You will override the category for www.bing.com.

To create a web rating override


1. Return to the Local-FortiGate GUI, and then click Security Profiles > Web Rating Overrides.

2. Click Create New, and then configure the following settings:

Field Value

URL www.bing.com

Category Security Risk

Sub-Category Malicious Websites

3. Click OK.

11
Test the Web Rating Override
You will test the web rating override you created in the previous procedure.

To test the web rating override


1. On the Local-Client VM, open a new browser tab, and then try to access the www.bing.com website
again.

The website is blocked, and it matches a local rating instead of a FortiGuard rating.

Stop and think!

Why is the website www.bing.com blocked?

The web rating override changes the category. In the default web profile applied
in the firewall policy, the Malicious Websites category is set to Block. As a
consequence, the website www.bing.com is now blocked.

12
Configure an Authenticate Action
You will set the action for the Malicious Websites FortiGuard category to Authenticate. You will then define a
user in order to test the authenticate action.

To set up the authenticate action


1. Continuing on the Local-FortiGate GUI, click Security Profiles > Web Filter.

2. Double-click the default web filter profile to edit it.

3. Under FortiGuard Category Based Filter, expand Security Risk, right-click Malicious Websites, and
then select Authenticate.

The Edit Filter window opens, which allows you to modify the warning interval and select the user groups.

4. Configure the following settings:

Field Value

Warning Interval 5 minutes

Selected User Groups Override_Permissions

5. Click OK.

6. Click OK.

For the purpose of this lab, Override_Permissions is a predefined user group. To


review the user groups, click User & Authentication > User Groups.

To create a user
1. Continuing on the Local-FortiGate GUI, click User & Authentication > User Definition.

2. Click Create New.

3. In the User Type field, select Local User.

4. Click Next, and then configure the following settings:

Field Value

Username student

Password fortinet

5. Click Next.

6. Click Next.

13
7. Enable User Group, and then select Override_Permissions.

8. Click Submit.

The student user is created.

To test the web rating override

1. On the Local-Client VM, open a new browser tab, and then try to access www.bing.com.

A warning appears. Notice that it is a different message from the one that appeared before.

2. Click Proceed.

You might receive a certificate warning at this stage. This is normal and is the
result of using a self-signed certificate. Accept the warning message to proceed
with the remainder of the procedure (click Advanced, and then click Accept the
Risk and Continue).

3. Enter the following credentials:

Field Value

Username student

14
Field Value

Password fortinet

4. Click Continue.

The www.bing.com website now displays correctly.

5. Close the Local-Client VM browser tabs.

LAB-8 > Configuring FortiGuard Web Filtering

15
Exercise 2: Configuring Static URL Filtering
In this exercise, you will configure a static URL filter and apply the security profile to a firewall policy in flow-
based inspection mode. You will then review the web filter logs.

Set Up the Static URL Filter in Flow-Based Inspection Mode


You will create a static URL filter entry and change the inspection mode to flow-based.

To create a static URL filter


1. Connect to the Local-FortiGate GUI, and then log in with the username admin and password password.

2. Click Security Profiles > Web Filter.

3. Double-click the default web filter profile to edit it.

4. In the Static URL Filter section, enable URL Filter.

5. Click Create New, and then configure the following settings:

Field Value

URL www.bing.com

Type Simple

Action Block

Status Enable

6. Click OK.

Your configuration should match the following example:

7. Click OK.

16
To change the inspection mode to flow-based
1. Continuing on the Local-FortiGate GUI, click Security Profiles > Web Filter.

2. Double-click the default web filter profile to edit it.

3. In the Feature set field, select Flow-based.

4. Click OK.

5. Click Policy & Objects > Firewall Policy.

6. Double-click the Full_Access policy to edit it.

7. In the Inspection Mode field, select Flow-based.

8. Click OK.

To test the static URL filter

1. On the Local-Client VM, open a new browser tab, and then try to access www.bing.com.

A warning appears. Notice that it is a different message from the one that appeared before.

Stop and think!

Why is the replacement message different?

FortiGate applies the static URL filter before the FortiGuard category filter.
The www.bing.com URL matches the URL filter pattern and therefore is now
blocked, and FortiGate displays the corresponding URL filter message.

17
To review the web filter logs
1. Return to your browser tab where you are logged in to the Local-FortiGate GUI, and then click Log &
Report > Security Events.

2. Under Summary, click Web Filter.

You should see information similar to the following example:

Stop and think!

Why is the first log entry for the www.bing.com website defined as blocked?

Initially, the www.bing.com website has the category Search Engines and Portals, which
was set to Allow and does not generate a security log.

To allow a website and generate a security log at the same time, you must set the category
to Monitor.

Then, according to the logs, http://www.bing.com is blocked, but after you


clicked Proceed and authenticated, the logs show a different action: passthrough.

Remember that you overrode the Search Engines and Portals category to Malicious
Websites, which was set to Block, and then to Authenticate.

3. Double-click a log entry with an empty category.

You should see information similar to the following example:

18
Stop and think!

Why is the category field empty?

Because the website is blocked by the static URL filter, FortiGuard does not apply the
FortiGuard web rating, and does not provide the category.

LAB-8 > Configuring Static URL Filtering

19

You might also like