Fortinet white logo
Fortinet white logo

Administration Guide

IP Address Connector

IP Address Connector

Creating an IP Address connector allows you to dynamically import an external block list from an HTTP/HTTPS server in the form of a plain text file. Block lists can be used to enforce special security requirements, such as blocking access from certain IP addresses. The lists are dynamically imported, so that any changes are immediately imported by FortiWeb.

After you have imported your external block list through the IP Address connector, you can apply the IP External resource in IP Protection > IP List.

  • You cannot delete an IP Address connector or modify its status if the external resource is being used in IP Protection > IP List and IP Protection > IP Reputation.
  • Up to 512 external resources can be supported across all the ADOMs, however, large numbers of external resources may affect system performance.
Requirements:
  • The external block list must be accessible from an HTTP/HTTPS server.
  • The import file must be in plain text and each line must contain an IP, IP Range, or Subnet in the below formats:

    IP/ IP Range/ Subnet

    Example

    IPv4192.168.2.100
    IPv4 Subnet172.200.1.4/16
    IPv4 Range172.16.8.1-172.16.8.100
    IPv62001:0db8::eade:27ff:fe04:9a01
    IPv6 Subnet2001:0db8::eade:27ff:fe04:9a01/120
    IPv6 Range2001:0db8::eade:27ff:fe04:aa01-2001:0db8::eade:27ff:fe04:ab01
  • The maximum import file size is 10 MB, or 128 KB (128 × 1024 = 131072) entries, whichever limit is hit first.

To create and configure an IP Address connector:
  1. Go to Security Fabric > External Connectors.
  2. Click Create New.
  3. Under Threat Feeds, click IP Address to display the configuration editor.
  4. Configure the following IP Address settings:

    Setting

    Description

    NameSpecify the name of the IP Address connector. Valid characters are A-Z, a-z, 0-9, _, and -. No spaces.

    Protocol

    Select the protocol used for the connections between FortiWeb and the IP External resource.

    TLS Certificate

    Select the TLS certificate used for the HTTPS connection between FortiWeb and the IP External resource. It should be uploaded in the Local tab in Sever Objects > Certificates > Local.

    Available only if HTTPS is selected for Protocol.

    Verify Host Certificate

    Enable this option to verify the IP External resource's URI is valid by checking the ownership of the CA certificate.

    Available only if HTTPS is selected for Protocol.

    CA

    Select the CA certificate of the IP External resource's URI. It should be uploaded in the CA tab in Sever Objects > Certificates > CA.

    Available only if HTTPS is selected for Protocol.

    URI of External ResourceSpecify the URI of the HTTP/HTTPS server where the IP address list is stored.
    HTTP Basic Authentication Enable/disable HTTP Basic Authentication to require username and password to access the IP address list.
    Username

    The Username option is available if HTTP Basic Authentication is enable.

    Specify the username to be used to access this IP address list.

    Password

    The Password option is available if HTTP Basic Authentication is enable.

    Specify the password to be used to access this IP address list.

    Refresh Rate

    Specify the refresh rate in minutes. (Default: 5. Range: 1-43200 minutes).

    FortiWeb will retrieve the data from the HTTP/HTTPS server periodically according to the refresh rate.

    Comments Optionally, enter comments about the IP Address connector.

    Last Update

    Display the status of the IP address entries.

    StatusEnable/disable the IP Address connector.
  5. Click Save.
    The newly created IP Address connector appears on the External Connectors page under Threat Feeds. You can apply the IP External connector in an IP Group (Server Objects > IP Groups) and apply the IP group in IP Protection > IP List and IP Protection > IP Reputation.
To view the external block list IP entries and the resource update status:
  1. Go to Security Fabric > External Connectors.
  2. Under Thread Feeds, double-click the IP Address Connector to display the configuration editor.
  3. From the Last Update field, you can see the date of when the resource was last updated.
  4. Click View Entries to display the IP address list entries.
    A dialog appears displaying the entries imported for the IP Address Connector.

    The imported file has been parsed line by line and marked as valid or invalid based on whether the entry meets format requirements for IP, IP Range, or Subnet.

IP Address Connector

IP Address Connector

Creating an IP Address connector allows you to dynamically import an external block list from an HTTP/HTTPS server in the form of a plain text file. Block lists can be used to enforce special security requirements, such as blocking access from certain IP addresses. The lists are dynamically imported, so that any changes are immediately imported by FortiWeb.

After you have imported your external block list through the IP Address connector, you can apply the IP External resource in IP Protection > IP List.

  • You cannot delete an IP Address connector or modify its status if the external resource is being used in IP Protection > IP List and IP Protection > IP Reputation.
  • Up to 512 external resources can be supported across all the ADOMs, however, large numbers of external resources may affect system performance.
Requirements:
  • The external block list must be accessible from an HTTP/HTTPS server.
  • The import file must be in plain text and each line must contain an IP, IP Range, or Subnet in the below formats:

    IP/ IP Range/ Subnet

    Example

    IPv4192.168.2.100
    IPv4 Subnet172.200.1.4/16
    IPv4 Range172.16.8.1-172.16.8.100
    IPv62001:0db8::eade:27ff:fe04:9a01
    IPv6 Subnet2001:0db8::eade:27ff:fe04:9a01/120
    IPv6 Range2001:0db8::eade:27ff:fe04:aa01-2001:0db8::eade:27ff:fe04:ab01
  • The maximum import file size is 10 MB, or 128 KB (128 × 1024 = 131072) entries, whichever limit is hit first.

To create and configure an IP Address connector:
  1. Go to Security Fabric > External Connectors.
  2. Click Create New.
  3. Under Threat Feeds, click IP Address to display the configuration editor.
  4. Configure the following IP Address settings:

    Setting

    Description

    NameSpecify the name of the IP Address connector. Valid characters are A-Z, a-z, 0-9, _, and -. No spaces.

    Protocol

    Select the protocol used for the connections between FortiWeb and the IP External resource.

    TLS Certificate

    Select the TLS certificate used for the HTTPS connection between FortiWeb and the IP External resource. It should be uploaded in the Local tab in Sever Objects > Certificates > Local.

    Available only if HTTPS is selected for Protocol.

    Verify Host Certificate

    Enable this option to verify the IP External resource's URI is valid by checking the ownership of the CA certificate.

    Available only if HTTPS is selected for Protocol.

    CA

    Select the CA certificate of the IP External resource's URI. It should be uploaded in the CA tab in Sever Objects > Certificates > CA.

    Available only if HTTPS is selected for Protocol.

    URI of External ResourceSpecify the URI of the HTTP/HTTPS server where the IP address list is stored.
    HTTP Basic Authentication Enable/disable HTTP Basic Authentication to require username and password to access the IP address list.
    Username

    The Username option is available if HTTP Basic Authentication is enable.

    Specify the username to be used to access this IP address list.

    Password

    The Password option is available if HTTP Basic Authentication is enable.

    Specify the password to be used to access this IP address list.

    Refresh Rate

    Specify the refresh rate in minutes. (Default: 5. Range: 1-43200 minutes).

    FortiWeb will retrieve the data from the HTTP/HTTPS server periodically according to the refresh rate.

    Comments Optionally, enter comments about the IP Address connector.

    Last Update

    Display the status of the IP address entries.

    StatusEnable/disable the IP Address connector.
  5. Click Save.
    The newly created IP Address connector appears on the External Connectors page under Threat Feeds. You can apply the IP External connector in an IP Group (Server Objects > IP Groups) and apply the IP group in IP Protection > IP List and IP Protection > IP Reputation.
To view the external block list IP entries and the resource update status:
  1. Go to Security Fabric > External Connectors.
  2. Under Thread Feeds, double-click the IP Address Connector to display the configuration editor.
  3. From the Last Update field, you can see the date of when the resource was last updated.
  4. Click View Entries to display the IP address list entries.
    A dialog appears displaying the entries imported for the IP Address Connector.

    The imported file has been parsed line by line and marked as valid or invalid based on whether the entry meets format requirements for IP, IP Range, or Subnet.