How to use the web UI
This topic describes aspects that are general to the use of the web UI, a graphical user interface (GUI) that provides access to FortiWeb appliance from a web browser.
System requirements
The management computer that you use to access the web UI must have:
- A compatible web browser, such as Microsoft Edge 41 or greater, Mozilla Firefox 59 or greater, or Google Chrome 65 or greater
- Adobe Flash Player 10 or greater plug-in
To minimize scrolling, the computer’s screen should have a resolution that is a minimum of 1280 x 1024 pixels.
URL for access
For first-time connection, see Connecting to the web UI.
The default URL to access the web UI through the network interface on port1 is:
HTTPS://192.168.1.99
If the network interfaces were configured during installation of the FortiWeb appliance (see Configuring the network settings), the URL and/or permitted administrative access protocols may no longer be in their default state. In that case, use either a DNS-resolvable domain name for the FortiWeb appliance as the URL, or the IP address that was assigned to the network interface during the installation process.
For example, you might have configured port2 with the IP address 192.0.2.155 and enabled HTTPS. You might have also configured a private DNS server on your network to resolve FortiWeb.example.com to 192.0.2.155. In this case, to access the web UI through port2, you could enter either HTTPS://
FortiWeb.example.com/
or HTTPS://192.0.2.155/
.
For details about enabling administrative access protocols and configuring IP addresses for the FortiWeb appliance, see Configuring the network settings.
If the URL is correct and you still cannot access the web UI, you may also need to configure FortiWeb to accept login attempts for your administrator account from that computer (that is, trusted hosts), and/or static routes. For details, see Administrators and Adding a gateway. |
Permissions
Depending on the account that you use to log in to the FortiWeb appliance, you may not have complete access to all CLI commands or areas of the web UI.
Together, both:
- Access profiles and
- Administrative domains (ADOMs)
control which commands and settings an administrator account can use.
Access profiles assign either:
- Read (view access)
- Write (change and execute access)
- Both Read and Write
- No access
to each area of the FortiWeb software.
Similar to VDOMs on FortiGate, ADOMs on FortiWeb divide policies and other settings so that they each can be assigned to a different administrators.
Access profile setting | Grants access to* | |
---|---|---|
Admin Users | System > Admin ... except Settings | Web UI |
admingrp
|
config system admin
config system accprofile
|
CLI |
Auth Users | User ... | Web UI |
authusergrp
|
config user ...
|
CLI |
Log & Report | Log & Report ... | Web UI |
loggrp
|
config log ...
execute formatlogdisk
|
CLI |
Maintenance | System > Maintenance except System Time tab | Web UI |
mntgrp
|
diagnose system ...
execute backup ...
execute factoryreset
execute rebootexecute restore ...
execute shutdown
diagnose system flash ...
|
CLI |
Network Configuration | Network ... | Web UI |
netgrp
|
config router ...
|
CLI |
System Configuration | System ... except Network, Admin, and Maintenance tabs | Web UI |
sysgrp
|
config system except accprofile , admin , dns , interface , and v-zone diagnose hardware ... diagnose network sniffer ... diagnose system ... exceptflash ... execute date ... execute ha ... execute ping ... execute ping-options ... execute traceroute ... execute time ... |
CLI |
Server Policy Configuration | Policy > Server Policy ... Server Objects ... Application Delivery ... | Web UI |
traroutegrp
|
config server-policy ... except custom-application ... config waf file-compress-rule config waf HTTP-authen ... config waf url-rewrite ... diagnose policy ... |
CLI |
Web Anti-Defacement Management | Web Anti-Defacement ... | Web UI |
wadgrp
|
config wad ...
|
CLI |
Web Protection Configuration | Policy > Web Protection ... Web Protection ... DoS Protection ... |
Web UI |
wafgrp
|
config system dos-prevention
config waf except:
|
CLI |
Machine Learning Configuration |
Web Protection > ML Based Anomaly Detection Bot Mitigation > ML Based Bot Detection API Protection > ML Based API Protection |
Web UI |
|
config waf api-learning-policy config waf bot-detection-policy config waf machine-learning-policy |
CLI |
Web Vulnerability Scan Configuration | Web Vulnerability Scan ... | Web UI |
wvsgrp
|
config wvs ...
|
CLI |
* For each config command, there is an equivalent get /show command, unless otherwise noted.config access requires write permission.get /show access requires read permission.
|
Unlike other administrator accounts, the administrator account named admin
exists by default and cannot be deleted. The admin
administrator account is similar to a root administrator account. This administrator account always has full permission to view and change all FortiWeb configuration options, including viewing and changing all other administrator accounts and ADOMs. Its name and permissions cannot be changed. It is the only administrator account that can reset another administrator’s password without being required to enter that administrator’s existing password.
Set a strong password for the admin administrator account, and change the password regularly. By default, this administrator account has no password. Failure to maintain the password of the admin administrator account could compromise the security of your FortiWeb appliance. |
For complete access to all commands and abilities, you must log in with the administrator account named admin
.
See also
Trusted hosts
As their name implies, trusted hosts are assumed to be (to a reasonable degree) safe sources of administrative login attempts.
Configuring the trusted hosts of your administrator accounts hardens the security of your FortiWeb appliance by further restricting administrative access. In addition to knowing the password, an administrator must connect only from the computer or subnets you specify. The FortiWeb appliance will not allow logins for that account from any other IP addresses. If all administrator accounts are configured with specific trusted hosts, FortiWeb will ignore login attempts from all other computers. eliminates the risk that FortiWeb could be compromised by a brute force login attack from an untrusted source.
Trusted host definitions apply both to the web UI and to the CLI when accessed through Telnet, SSH, or the Status dashboard. Local console access is not affected by trusted hosts, as the local console is by definition not remote, and does not occur through the network.
Relatedly, you can allow-list trusted end-user IP addresses. End users do not log in to the web UI, but their connections to protected web servers are normally subject to protective scans by FortiWeb unless the clients are trusted. For details, see "blocklisting & allowlisting clients using a source IP or source IP range" on page 1.
See also
Maximum concurrent administrator sessions
If single administrator mode is enabled, you will not be able to log in while any other account is logged in. You must either wait for the other person to log out, or power cycle the appliance.
For details, see How to use the web UI.
Global web UI & CLI settings
Some settings for connections to the web UI and CLI apply regardless of which administrator account you use to log in.
To configure administrator settings
- Go to System > Admin > Settings.
- Configure these settings:
- English
- Simplified Chinese
- Traditional Chinese
- Japanese
- Click Apply.
To access this part of the web UI, your administrator's account access profile must have Read and Write permission to items in the System Configuration category. For details, see Permissions.
Web Administration Ports | ||
HTTP |
Type the TCP port number on which the FortiWeb appliance will listen for HTTP administrative access. The default is 80. The HTTP access to FortiWeb's GUI will be automatically redirected to HTTPS. |
|
HTTPS | Type the TCP port number on which the FortiWeb appliance will listen for HTTPS administrative access. The default is 443. This setting has an effect only if HTTPS is enabled as an administrative access protocol on at least one network interface. For details, see Configuring the network interfaces. |
|
HTTPS Server Certificate |
Select the certificate that FortiWeb uses for secure connections to its Web UI. For details, see To upload the CA's certificate of the administrator's certificate. Certificates stored in System > Admin > Certificates are listed here for options. defaultHTTPScert is the Fortinet factory default certificate. For details, see How to change FortiWeb's default certificate. |
|
|
HTTPS Server Intermediate CA Group |
Select the intermediate certificate group if any. For details, see To upload the intermediate CA for the administrator. |
|
Supported SSL Protocols |
Specify which versions of the SSL or TLS cryptographic protocols clients can use to connect securely to the FortiWeb appliance. TLS protocol changes a lot since version 1.3, including the handshake algorithm, the supported ciphers and certificates. Make sure you understand how it works before enabling TLS 1.3. Note: TLS 1.2 is enabled by default, and you can use the following command to enable TLS 1.0, TLS 1.1, or TLS 1.3: config system global set admin-tls-v10 enable end For the supported ciphers of each TLS version, see Supported cipher suites & protocol versions. Available only if you specify a value for HTTPS. Note: Once you have changed the TLS version setting, you need to re-login to the system. |
Config-Sync | Enable Config sync then type the TCP port number on which the FortiWeb appliance will listen for configuration synchronization requests from the peer/remote FortiWeb appliance. The default is 995. For details, see Replicating the configuration without FortiWeb HA (external HA). Note: This is not used by HA. See FortiWeb high availability (HA) . |
|
Timeout Settings | ||
Idle Timeout | Type the number of minutes that a web UI connection can be idle before the administrator must log in again. The maximum is 480 minutes (8 hours). To maintain security, keep the idle timeout at the default value of 5 minutes. | |
Language | ||
Web Administration | Select which language to use when displaying the web UI. Languages currently supported by the web UI are: The display’s web pages will use UTF-8 encoding, regardless of which language you choose. UTF-8 supports multiple languages, and allows them to display correctly, even when multiple languages are used on the same web page. For example, your organization could have websites in both English and simplified Chinese. Your FortiWeb administrators prefer to work in the English version of the web UI. They could use the web UI in English while writing rules to match content in both English and simplified Chinese without changing this setting. Both the rules and the web UI will display correctly, as long as all rules were input using UTF-8. Usually, your text input method or your management computer’s operating system should match the display by also using UTF-8. If they do not, your input and the web UI may not display correctly at the same time. For example, your web browser’s or operating system’s default encoding for simplified Chinese input may be GB2312. However, you usually should switch it to be UTF-8 when using the web UI, unless you are writing regular expressions that must match HTTP client’s requests, and those requests use GB2312 encoding. Note: Regular expressions are impacted by language. For details, see Language support. Note: This setting does not affect the display of the CLI. |
|
Password Policy | ||
Minimum length | Enable to set the minimum password length. The valid range is 8–128, and the default value is 8. | |
Enable Single Admin User login | Enable to activate login by single admin user. | |
Character requirements | Enable to configure the password characters, the upper/lower case, numbers, and special characters. | |
Forbid password reuse | Enable to set the number of history passwords that can not be reused. | |
Password expiration | Enable to enter the valid period of the password. The valid range is 1–999 days. |
See also
Buttons, menus, & the displays
A navigation menu is located on the left side of the web UI. To expand a menu item, simply click it. To expand a submenu item click the > button located next to the submenu name, or click the submenu name itself. To view the pages located within a submenu, click the name of the page.
Do not use your browser’s Back button to navigate—pages may not operate correctly. Instead, use the navigation menu, tabs, and buttons within the pages of the web UI. |
To expand or collapse an area of the menu, click the name of the area itself. Within each area may be multiple submenus. To expand or collapse a submenu, click the > or v button next to the submenu name, or click the name of the submenu itself.
Within each submenu may be one or more tabs or sub-panes, which are displayed to the right of the navigation menu, in the content pane. At the top of the content pane is a toolbar. The toolbar contains buttons that enable you to perform operations on items displayed in the content pane, such as importing or deleting entries.
Each tab or pane (per Permissions) displays or allows you to modify settings, using a similar set of buttons.
Icon | Description |
---|---|
|
Click to collapse a visible area. |
|
Click to expand a hidden area. |
|
Click to view the first page’s worth of records within the tab. or pane. If this button is grey, you are already viewing the first page. |
|
Click to view the previous page’s worth of records within the tab or pane. If this button is grey, you are viewing the first page. |
|
To go to a specific page number, type the page number in the field and press Enter. The total number of pages depends on the number of records per page. |
|
Click to view the next page’s worth of records within the tab or pane. If this button is grey, you are viewing the last page. |
|
Click to view the last page’s worth of records within the tab or pane. If this button is gray, you are already viewing the last page. |
|
Click to create a new entry using only typical default values as a starting point. |
|
Click to create a new entry by duplicating an existing entry. To use this button, you must first mark a check box to select an existing entry upon which the new entry will be based. |
|
Click to modify an existing entry. To use this button, you must first select which existing entry you want to modify. Alternatively, you can double-click the existing entry, or right-click the entry and select Edit. |
|
Click to remove an existing entry. To use this button, you must first mark a check box to select which existing entry you want to remove. To delete multiple entries, either mark the check boxes of each entry that you want to delete, then click Delete. This button may not always be available. See Deleting entries. |
Common buttons are not described in subsequent sections of this guide.
Some pages have unique buttons, or special behaviors associated with common buttons. Those buttons are described in their corresponding section of this guide.
See also
Deleting entries
Back up the configuration before deleting any part of the configuration. Deleted items cannot be recovered unless you upload a backup copy of the previous configuration. For details, see Backup & restore and Restoring a previous configuration.
To delete a part of the configuration, you must first remove all references to it.
For example, if you selected a profile named “Profile1” in a policy named “PolicyA”, that policy references “Profile1” and requires it to exist. Therefore the appliance will not allow you to delete “Profile1” until you have reconfigured “PolicyA” (and any other references) so that “Profile1” is no longer required and may be safely deleted. Predefined entries included with the firmware cannot be deleted.
If you do not know where your configuration refers to the entry that you want to delete, to find the references, you can download a backup of the configuration and use a plain text editor to search for the entry’s name. |
See also
Renaming entries
In the web UI, each entry’s name is not editable after you create and save it.
For example, let’s say you create a policy whose Name is “PolicyA”. While configuring the policy, you change your mind about the policy’s name a few times, and ultimately you change the Name to “Blog-Policy”. Finally, you click OK to save the policy. Afterwards, if you edit the policy, most settings can be changed. However, Name is greyed-out, and cannot any longer be changed.
While you cannot edit Name, you can achieve the same effect by other means.
To rename an entry
- Clone the entry, supplying the new name.
- In all areas of the configuration that refer to the old name, replace the old entry name by selecting the new name.
- Delete the item with the old name.
If you do not know where your configuration refers to the entry that you want to delete, to find the references, you can download a backup of the configuration and use a plain text editor to search for the entry’s name. Alternatively, if you need to rename an item that is only referenced in the core configuration file, you can download a backup copy, use a plain text editor to find and replace the entry’s old name, then restore the modified configuration backup file to the appliance. Where there are many references, this may save time. |