Explicitly enable custom categories for web filter profiles, SSL/SSH inspection profiles, and proxy addresses 6.4.2
In all web filter profiles, local and remote categories must be manually enabled.
When a new threat feed connector or web rating overrides in a custom category are created, they will not impact any web filters until the category's action is changed to Monitor, Block, Warning, or Authenticate in the specific web filter's settings. If a URL is in multiple enabled categories, the order of precedence is local categories, then remote categories, and then FortiGuard categories.
In SSL/SSH inspection profiles, local and remote categories must be explicitly selected to be exempt from SSL inspection. In proxy addresses, local and remote categories must be explicitly selected as URL categories for them to apply. In both settings, if a URL is in multiple selected categories, the order of precedence is local categories, then remote categories, and then FortiGuard categories.
Web filter profiles
In this example, www.fortinet.com is added to both a custom, or local, category (Seriously) and an external threat feed, or remote, category (OnAworkComputer). The local category action is set to Monitor, while the remote category action is set to Block. When a user browses to www.fortinet.com, the local category action takes precedence over both the remote category and the FortiGuard category (Information Technology), so the Monitor action is taken.
To use local and remote categories in a web filter profile in the GUI:
- Go to Security Profiles > Web Rating Overrides and create a custom category and add URLs to it. See Web rating override for details.
- Go to Security Fabric > External Connectors and create a FortiGuard Category Threat Feed external connector to import an external blocklist.
- Go to Security Profiles > Web Filter and create or edit a web filter profile.
- Set Feature set to Proxy-based.
- Enable FortiGuard category based filter and change the action for the Local Categories and Remote Categories entries as needed. See FortiGuard filter for details.
When the action for a local or remote category is Allow, the category is disabled. The next category's action, in the order of preference, will be applied.
- Configure the remaining settings as required.
- Click OK.
To use local and remote categories in a web filter profile in the CLI:
- Create a custom category and add URLs to it. See Web rating override for details.
config vdom edit root config webfilter ftgd-local-cat edit "Seriously" set id 140 next end config webfilter ftgd-local-rating edit "www.fortinet.com" set rating 140 next end next end
- Create a FortiGuard Category Threat Feed external connector to import an external blocklist:
config global config system external-resource edit "OnAworkComputer" set category 192 set resource "https://192.168.0.5/lists/blocklist.txt" next end end
- Create or edit a web filter profile. See FortiGuard filter for details.
Local categories have an ID range of 140 to 191. Remote categories have an ID range of 192 to 221.
config vdom edit root config webfilter profile edit "WebFilter-1" set feature-set proxy config ftgd-wf unset options config filters edit 12 set category 12 set action warning next ... edit 23 set action warning next edit 140 set category 140 next edit 192 set category 192 set action block next end end next end next end
When a filter is added for the local and remote categories (140 and 192 in this example), the default action is
monitor
.
SSL/SSH inspection profiles
To use local and remote categories in an SSL/SSH inspection profile to exempt the categories from SSL inspection in the GUI:
- Go to Security Profiles > SSL/SSH Inspection.
- Create a new profile or edit an existing one.
- Ensure that Inspection method is Full SSL Inspection.
- In the Exempt from SSL Inspection section, add the local and remote categories to the Web categories list .
- Configure the remaining settings as required, then click OK.
To use local and remote categories in an SSL/SSH inspection profile to exempt the categories from SSL inspection in the CLI:
config firewall ssl-ssh-profile edit "SSL_Inspection" config https set ports 443 set status deep-inspection end ... config ssl-exempt edit 1 set fortiguard-category 140 next edit 2 set fortiguard-category 194 next end next end
Proxy addresses
To use local and remote categories in a proxy address in the GUI:
- Go to Policy & Objects > Addresses and click Create New > Address, or edit an existing proxy address.
- Set Category to Proxy Address.
- Set Type to URL Category.
- In the URL Category, add the local and remote categories.
- Configure the remaining settings as required, then click OK.
To use local and remote categories in a proxy address in the CLI:
config firewall proxy-address edit "proxy_override" set type category set host "all" set category 140 194 set color 23 next end