External feed connectors per VDOM
When multi-VDOM mode is enabled, an external feed connector can be defined in global or within a VDOM. Global external feeds can be used in any VDOM, but cannot be edited within the VDOM. FortiGuard category and domain name-based external feeds have an added category number field to identify the external feed. The external feed name in global must start with g-. External feed names in VDOMs cannot start with g-.
FortiGuard category and domain name-based external feed entries must have a number assigned to them that ranges from 192 to 221. This number can be assigned to both external feed types. However, when a category number is used under a global entry, such as 192 with the name g-cat-192, this category number cannot be used in any other global or VDOM entries. If a category is used under a VDOM entry, such as 192 under VDOM1 with the name cat-192, the category 192 can be used in another VDOM or root with the name cat-192.
An external feed connector can only be used in profiles in the VDOM that it was created in. Global connectors can be used in all VDOMs.
Each VDOM can have a maximum of 256 external feed entries. But in total, a FortiGate can only have 511 external feed entries.
To improve the security of the connection, it is recommended to enable server certificate validation (server-identity-check) either in basic or full mode.
To configure a FortiGuard category external feed connector under global in the GUI:
-
Go to Security Fabric > External Connectors and click Create New.
-
In the External Feeds section, click FortiGuard Category.
-
Enter a name that begins with
g-. -
Configure the other settings as needed.
-
Click OK.
To configure a FortiGuard category external feed connector under global in the CLI:
config global
config system external-resource
edit "g-category"
set status enable
set type category
set category 192
set comments ''
set resource "http://172.16.200.55/external-resource-test/513-FDGCategory.txt"
set server-identity-check {none | basic | full}
set refresh-rate 5
next
end
end
To configure a domain name external feed connector under a VDOM in the GUI:
-
Go to Security Fabric > External Connectors and click Create New.
-
In the External Feeds section, click Domain Name.
-
Enter a name that does not begin with
g-. -
Configure the other settings as needed.
-
Click OK. The external feed connector created under global also appears, but it is not editable.
To configure a domain name external feed connector under a VDOM in the CLI:
config vdom
edit vd1
config system external-resource
edit "vd1-domain"
set status enable
set type domain
set category 193
set comments ''
set resource "http://172.16.200.55/external-resource-test/513-Domain.txt"
set server-identity-check {none | basic | full}
set refresh-rate 5
next
end
next
end
To use an IP address external feed in a policy in the GUI:
-
Configure an IP address connector in global:
-
Go to Security Fabric > External Connectors and click Create New.
-
In the External Feeds section, click IP Address.
-
Enter a name that begins with
g-. -
Configure the other settings as needed.
-
Click OK.
-
-
Configure an IP address connector in the VDOM (vd1):
-
Go to Security Fabric > External Connectors and click Create New.
-
In the External Feeds section, click IP Address.
-
Enter a name that does not begin with
g-. -
Configure the other settings as needed.
-
Click OK. The external feed connectors created under global also appear, but they are not editable.
-
-
Configure the firewall policy in the VDOM (vd1):
-
Go to Policy & Objects > Firewall Policy and click Create New.
-
For Destination, select vd1-address. Since this policy is configured under vd1, g-address can also be set as the destination.
-
Configure the other settings as needed.
-
Click OK.
-
To use an IP address external feed in a policy in the CLI:
-
Configure the IP address connectors:
config global config system external-resource edit "g-address" set status enable set type address set username '' set comments '' set resource "http://172.16.200.55/external-resource-test/513-IP.txt" set server-identity-check {none | basic | full} set refresh-rate 5 next end endconfig vdom edit vd1 config system external-resource edit "vd1-address" set status enable set type address set comments '' set resource "http://172.16.200.55/external-resource-test/513-IP.txt" set user-agent "curl/7.58.0" set server-identity-check {none | basic | full} set refresh-rate 5 next end next end -
In the VDOM, configure a firewall policy with the external address as the destination address:
config vdom edit vd1 config firewall policy edit 1 set name "test" set srcintf "port10" set dstintf "port9" set srcaddr "all" set dstaddr "vd1-address" set action accept set schedule "always" set service "ALL" set profile-protocol-options "protocol" set nat enable next end next end
Since this firewall policy is configured under
vd1,g-addresscan also be set as thedstaddr.