Configuring a protection profile for inline topologies
Inline protection profiles combine previously configured rules, profiles, and policies into a comprehensive set that can be applied by a policy. Inline protection profiles contain only the features that are supported in inline topologies, which you use with operation modes Reverse Proxy, True Transparent Proxy, and WCCP.
When the operation mode is changed to Offline Protection or Transparent Inspection, the Inline Protection tab will be hidden.
|
|
Inline protection profiles include features that require an inline network topology. They can be configured at any time, but cannot be applied by a policy if the FortiWeb appliance is operating in a mode that does not support them. For details, see How operation mode affects server policy behavior. |
To configure an inline protection profile
- Before configuring an inline protection profile, first configure any of the following that you want to include in the profile:
- a client management policy (see Client management)
- a signature set (see Known Attacks )
- a HTTP protocol constraints profile (see HTTP/HTTPS protocol constraints)
- an
X-Forwarded-For:or other X-header rule (see Defining your proxies, clients, & X-headers) - a cookie security policy (see Cookie Security)
- a custom policy (see Custom Policy)
- an oracle padding protection rule (see Defeating cipher padding attacks on individually encrypted inputs)
- a cross-site request forgery (CSRF) protection rule (see Defeating cross-site request forgery (CSRF) attacks)
- an HTTP header security policy (see HTTP Security Headers)
- a Man in the Browser protection policy (see Man in the Browser (MitB) Protection)
- a URL encryption policy (see "URL encryption")
- a SQL/XSS syntax based detection policy (see Syntax Based Detection)
- a parameter validation policy (see Validating parameters (“input rules”))
- a hidden field protection rule (see Preventing tampering with hidden inputs)
- a file security policy (see Limiting file uploads)
- a web shell detection policy (see Web Shell Detection
- a WebSocket security policy (see WebSocket protocol)
- a URL access policy (see Restricting access based on specific URLs)
- an allowed method policy (see Specifying allowed HTTP methods)
- a CORS protection policy (see Cross-Origin Resource Sharing (CORS) protection)
- a bot mitigation policy (see Configuring bot mitigation policy)
- an XML protection policy (see Configuring XML protection)
- a JSON protection policy (see Configuring JSON protection)
- an OpenAPI validation policy (see OpenAPI Validation)
- an API gateway policy (see Configuring API gateway policy)
- a DoS protection policy (see Grouping DoS protection rules)
- a mobile API protection policy (see Configuring mobile API protection)
- a URL rewriting or redirection set (see Rewriting & redirecting)
- an authentication policy (see Offloading HTTP authentication and authorization)
- a site publishing policy (see Site Publishing (Single sign-on))
- a file compression rule (see Configuring compression offloading)
- an IP reputation policy (see IP Protection)
- an IP list policy (see IP Protection)
- a Geo IP policy (see IP Protection)
- a user tracking policy (see Tracking)
- a trigger if you plan to use policy-wide log and alert settings (see Viewing log messages)
To access this part of the web UI, your administrator’s account access profile must have Read and Write permission to items in the Web Protection Configuration category. For details, see Permissions.
Alternatively, click the Clone icon to copy an existing profile as the basis for a new one. The predefined profiles supplied with your FortiWeb appliance cannot be edited, only viewed or cloned.
Setting | Description |
|---|---|
| Name | Type a unique name that can be referenced in other parts of the configuration. The maximum length is 63 characters. |
| Standard Protection | |
| Signatures | Select the name of the signature set you have configured in Web Protection > Known Attacks, if any, that will be applied to matching requests. To enable signature detection for API applications (XML, JSON, File Security, GraphQL, gRPC and WebSocket) make sure to enable signature detection in the relevant API Protection policy. Attack log messages for this feature vary by which type of attack was detected. For a list, see Known Attacks . |
| HTTP Protocol Constraints | Select the name of an HTTP parameter constraint, if any, that will be applied to matching requests. For details, see HTTP/HTTPS protocol constraints. Attack log messages for this feature vary by which type of constraint was violated. |
| X-Forwarded-For | Select the Note: Configuring this option is required if the true IP address of the client is hidden from FortiWeb because a load balancer or other web proxy is deployed in front. In that case, you must configure an X-header rule so that FortiWeb will block only requests related to the original client. Otherwise, it may block all requests whenever any attack occurs, since all requests will appear to originate from the proxy’s IP. |
| Client Side Security | |
| Client Management | Enable to track a client by the inserted cookie, or source IP when cookie is prohibited. |
Client-Side Protection | This field appears only when a valid Client-Side Protection license is present. Select the name of a Client-Side Protection policy. For details, see Client-Side Protection. Note: To activate this policy, both an HTTP Header Security policy and a Subresource Integrity Policy must also be configured in the same Web Protection Profile. |
| HTTP Header Security | Select the name of HTTP Header Security policy, if any, to apply to matching responses. For details, see HTTP Security Headers. |
| CORS Protection | Select the name of an existing CORS Protection policy. For details, see Cross-Origin Resource Sharing (CORS) protection. |
Subresource Integrity Policy | Select the name of an SRI policy to enforce integrity on external resources. For details, Subresource Integrity (SRI) Check. |
| Man in the Browser Protection | Select the name of an MiTB protection rule, if any, that will be applied to matching requests. For details, Man in the Browser (MitB) Protection. |
| Cookie Security Policy | Select the name of a cookie security policy to apply to matching requests. For details, see Cookie Security. If the Security Mode option in the policy is Signed, ensure that Configuring a protection profile for inline topologies is On. |
Advanced Protection | |
| Custom Policy | Select the name of a combination source IP, rate limit, HTTP header, and URL access policy, if any, that will be applied to matching requests. For details, see Custom Policy. Attack log messages contain |
| CSRF Protection | Select the name of cross-site request forgery protection rule, if any, to apply to matching requests. For details, see Defeating cross-site request forgery (CSRF) attacks. |
URL Encryption Policy | Select the name of a URL encryption policy if any, that will be applied to matching requests. For details, see URL encryption. |
Link Cloaking Policy | Select the name of a Link Cloaking policy if any, that will be applied to matching requests. For details, see Link cloaking. |
Syntax Based Detection | Select the name of a SQL/XSS syntax based detection policy if any, that will be applied to matching requests. For details, see Syntax Based Detection. |
Data Loss Prevention | |
Data Loss Prevention | Select the name of a Data Loss Prevention policy if any, that will be applied to matching requests. For details, see Data Loss Prevention. |
Input Validation | |
| Parameter Validation | Select the name of the parameter validation rule, if any, that will be applied to matching requests. For details, see Validating parameters (“input rules”). Attack log messages contain |
| Hidden Fields Protection | Select the name of the hidden fields protection rule, if any, to use to protect hidden fields on your website. For details, see Preventing tampering with hidden inputs. Attack log messages contain This option appears only when Client Management is enabled. |
| File Security | Select an existing file security policy, if any, that will be applied to matching HTTP requests. For details, see Limiting file uploads. Attack log messages contain |
Web Shell Detection | Select the name of a Web Shell Detection policy if any, that will be applied to matching requests. For details, see Web Shell Detection. |
File List | Select a File List configuration, if any, that will be applied to matching requests for Data Loss Prevention, File Security, and Web Shell Detection. For details, see Configuring a File List Policy. |
Protocol | |
| WebSocket Security | Select the name of a WebSocket Security rule, if any, that will be applied to matching requests. For details, see WebSocket protocol. |
gRPC Security | Select the name of a gRPC security rule, if any, that will be applied to matching requests. For details, see gRPC protocol. |
Access | |
| URL Access | Select the name of the URL access policy, if any, that will be applied to matching HTTP requests. For details, see Restricting access based on specific URLs. Attack log messages contain |
| Allow Method | Select an existing allow method policy, if any, that will be applied to matching HTTP requests. For details, see Specifying allowed HTTP methods. Attack log messages contain |
Bot Mitigation | |
Bot Mitigation Policy | Select the name of an existing Bot Mitigation policy. For details, see Configuring bot mitigation policy. |
API Protection | |
XML Protection | Select the name of an existing XML protection policy. For details, see Configuring XML protection. |
JSON Protection | Select the name of an existing JSON protection policy. For details, see Configuring JSON protection. |
GraphQL protection | Select the name of an existing OpenAPI protection policy. For details, see Configuring GraphQL protection. |
OpenAPI Protection | Select the name of an existing OpenAPI protection policy. For details, see OpenAPI Validation. |
Mobile API Protection | Select the name of an existing Mobile API Protection policy. For details, see Configuring mobile API protection. |
Mobile Application Identification | Select the JWT verification method FortiWeb uses to authenticate mobile application requests. This setting determines how FortiWeb validates the authenticity of JWTs (JSON Web Tokens) provided by mobile clients, typically in the HTTP request headers. Available options:
For all methods, you must also specify the Token Header, which indicates the HTTP header field (default: This setting is essential for enabling secure, token-based client identification in mobile API workflows. |
DoS Protection | |
| DoS Protection Policy | Select the name of an existing DoS prevention policy. For details, see Grouping DoS protection rules. |
Application Delivery | |
| URL Rewriting | Select the name of a URL rewriting rule set, if any, that will be applied to matching requests. For details, see Rewriting & redirecting. |
| Site Publish | Select the name of a site publishing policy, if any, that will be applied to matching requests. For details, see Site Publishing (Single sign-on). |
| File Compress | Select the name of an compression policy, if any, that will be applied to matching requests. For details, see Configuring compression offloading. |
Waiting Room | Select the name of a Waiting Room policy, if any, that will be applied to matching requests. For details, see Waiting room. |
IP Protection | |
| IP Reputation | Enable to apply IP reputation intelligence. For details, see IP Protection. |
| FortiGate Quarantined IPs | Enable to detect source IP addresses that a FortiGate unit is currently preventing from interacting with the network and protected systems. Then, select the action that FortiWeb takes if it detects a quarantined IP address:
Note: If FortiWeb is deployed behind a NAT load balancer and this option is enabled, to prevent FortiWeb from blocking all connections when it detects a violation of this type, define an X-header that indicates the original client’s IP. For details, see Defining your proxies, clients, & X-headers. In addition, select a severity level and trigger policy. For information on configuring communication with the FortiGate that provides the list of quarantined IP addresses, see Receiving quarantined source IP addresses from FortiGate. |
| IP List | Select the name of a client allow list or block list, if any, that will be applied to matching requests. For details, see IP Protection. |
| Geo IP | Select the name of a geographically-based client block list, if any, that will be applied to matching requests. For details, see IP Protection. |
Tracking | |
| User Tracking | Select the name of a user tracking policy, if any, to use for matching requests. For details, see Tracking. |
Redirect | |
| Redirect URL | Type a URL including the FQDN/IP and path, if any, to which a client will be redirected if:
For example, you could enter:
If you do not enter a URL, depending on the type of violation and the configuration, the FortiWeb appliance will log the violation, may attempt to remove the offending parts, and could either reset the connection or return an HTTP |
| Redirect URL With Reason | Enable to include the reason for redirection as a parameter in the URL, such as By default, this option is disabled. Caution: If the FortiWeb appliance is protecting a redirect URL, enable this option to prevent infinite redirect loops. |
| Comments | Optional text describing the purpose or notes for this profile. |
To view or modify a component without leaving the page, next to the drop-down menu where you have selected the component, click Detail.