Fortinet white logo
Fortinet white logo

Cookbook

Filtering

Filtering

Web filtering is used to block access to harmful, inappropriate, and dangerous web sites (see FortiGuard filter).

Email filtering is used to detect and block spam messages (see FortiGuard-based filters).

To configure filtering in the GUI:
  1. Go to System > FortiGuard
  2. Scroll down to the Filtering section.
  3. Configure the settings as needed:

    Web Filter Cache

    Enable/disable web filter cache, and set the amount of time that the FortiGate will store a blocked IP address or URL locally. After the time expires, the FortiGate contacts the FDN to verify the address.

    Anti-Spam Cache

    Enable/disable email filter cache, and set the amount of time that the FortiGate will store an email address locally.

    FortiGuard Filtering Protocol

    Select the protocol for contacting the FortiGuard servers.

    FortiGuard Filtering Port

    Select the port assignments for contacting the FortiGuard servers.

    Filtering Service Availability

    The status of the filtering service. Click Check Again if the filtering service is not available.

    Request re-evaluation of a URL's category

    Click to re-evaluate a URL category rating on the FortiGuard web filter service.

  4. Click Apply.
To configure filtering in the CLI:
config system fortiguard
    set protocol {https | udp | http}
    set port {443 | 53 | 8888 |80} 
    set antispam-force-off {enable | disable}
    set antispam-cache {enable | disable}
    set antispam-cache-ttl <integer>
    set antispam-cache-mpercent <percent>
    set antispam-timeout <integer>
    set webfilter-force-off {enable | disable}
    set webfilter-cache {enable | disable}
    set webfilter-cache-ttl <integer>
    set webfilter-timeout <integer>
end
Note

FortiGuard server support for HTTPS on port 443 is supported as of FortiOS 6.2.2.

Filtering

Filtering

Web filtering is used to block access to harmful, inappropriate, and dangerous web sites (see FortiGuard filter).

Email filtering is used to detect and block spam messages (see FortiGuard-based filters).

To configure filtering in the GUI:
  1. Go to System > FortiGuard
  2. Scroll down to the Filtering section.
  3. Configure the settings as needed:

    Web Filter Cache

    Enable/disable web filter cache, and set the amount of time that the FortiGate will store a blocked IP address or URL locally. After the time expires, the FortiGate contacts the FDN to verify the address.

    Anti-Spam Cache

    Enable/disable email filter cache, and set the amount of time that the FortiGate will store an email address locally.

    FortiGuard Filtering Protocol

    Select the protocol for contacting the FortiGuard servers.

    FortiGuard Filtering Port

    Select the port assignments for contacting the FortiGuard servers.

    Filtering Service Availability

    The status of the filtering service. Click Check Again if the filtering service is not available.

    Request re-evaluation of a URL's category

    Click to re-evaluate a URL category rating on the FortiGuard web filter service.

  4. Click Apply.
To configure filtering in the CLI:
config system fortiguard
    set protocol {https | udp | http}
    set port {443 | 53 | 8888 |80} 
    set antispam-force-off {enable | disable}
    set antispam-cache {enable | disable}
    set antispam-cache-ttl <integer>
    set antispam-cache-mpercent <percent>
    set antispam-timeout <integer>
    set webfilter-force-off {enable | disable}
    set webfilter-cache {enable | disable}
    set webfilter-cache-ttl <integer>
    set webfilter-timeout <integer>
end
Note

FortiGuard server support for HTTPS on port 443 is supported as of FortiOS 6.2.2.