Web rating override
Web rating overrides allow you to add specific URLs to both FortiGuard and custom web ratings categories.
In a web filter profile, the action for each category can be configured. See FortiGuard filter for details. A web rating override in a custom category will not impact any web filters until the category's action is changed to Allow, Monitor (default), Block, Warning, or Authenticate in the specific web filter profile's settings. If a URL is in multiple enabled categories, the order of precedence is local categories, then remote categories, and then FortiGuard categories.
In SSL/SSH inspection profiles, custom categories must be explicitly selected to be exempt from SSL inspection. In proxy addresses, custom categories must be explicitly selected as URL categories for them to apply. In both settings, if a URL is in multiple selected categories, the order of precedence is local categories, then remote categories, and then FortiGuard categories.
Web rating override requires a FortiGuard license. |
Web filter profiles
In this example, www.fortinet.com is added to both a custom, or local, category (Seriously) and an external threat feed, or remote, category (OnAworkComputer). The local category action is set to Monitor, while the remote category action is set to Block. When a user browses to www.fortinet.com, the local category action takes precedence over both the remote category and the FortiGuard category (Information Technology), so the Monitor action is taken.
To create a custom category in the GUI:
- Go to Security Profiles > Web Rating Overrides.
- Click Custom Categories, then click Create New.
- Enter a name for the category, and ensure the Status is set to Enable.
- Click OK.
To create a web rating override in the GUI:
- Go to Security Profiles > Web Rating Overrides and click Create New.
- Enter the URL to override.
- Optionally, click Lookup rating to see what its current rating is, if it has one.
- For Category, select Custom Categories and for Sub-Category select the category previously created.
- Click OK.
To create a new FortiGuard category threat feed in the GUI:
-
Go to Security Fabric > External Connectors and click Create New.
- In the Threat Feeds section, click FortiGuard Category.
- Enter a name for the threat feed, such as OnAworkComputer.
- Enter the URI of external resource.
-
Configure the remaining settings as needed, then click OK.
To use the new categories in a web filter profile in the GUI:
- Go to Security Profiles > Web Filter and create or edit a web filter profile. See FortiGuard filter for more information.
- Enable FortiGuard category based filter
-
Set the action for the Seriously category in the Local Categories group to Monitor.
-
Set the action for the OnAworkComputer category in the Remote Categories group to Block.
Setting the custom category action to Allow is equivalent to setting the CLI
action
variable tomonitor
andlog
variable todisable
. - Configure the remaining settings are required, then click OK.
To use local and remote categories in a web filter profile in the CLI:
- Create the custom category and add a URL to it:
config vdom edit root config webfilter ftgd-local-cat edit "Seriously" set id 140 next end config webfilter ftgd-local-rating edit "www.fortinet.com" set rating 140 next end next end
- Create a FortiGuard Category Threat Feed external connector to import an external blocklist.
config global config system external-resource edit "OnAworkComputer" set category 192 set resource "https://192.168.0.5/lists/blocklist.txt" next end end
- Enable the new category in a web filter profile. See FortiGuard filter for details.
Custom local categories have an ID range of 140 to 191. Remote categories have an ID range of 192 to 221.
config vdom edit root config webfilter profile edit "WebFilter-1" set feature-set proxy config ftgd-wf unset options config filters edit 12 set category 12 set action warning next ... edit 23 set action warning next edit 140 set category 140 next edit 192 set category 192 set action block next end end next end next end
When a filter is added for the local and remote categories (140 and 192 in this example), the default action is
monitor
with logging enabled.
SSL/SSH inspection profiles
To use local and remote categories in an SSL/SSH inspection profile to exempt them from SSL inspection in the GUI:
- Go to Security Profiles > SSL/SSH Inspection.
- Create a new profile or edit an existing one.
- Ensure that Inspection method is Full SSL Inspection.
- In the Exempt from SSL Inspection section, add the local and remote categories to the Web categories list .
- Configure the remaining settings as required, then click OK.
To use local and remote categories in an SSL/SSH inspection profile to exempt them from SSL inspection in the CLI:
config vdom edit root config firewall ssl-ssh-profile edit "SSL_Inspection" config https set ports 443 set status deep-inspection end ... config ssl-exempt edit 1 set fortiguard-category 140 next edit 2 set fortiguard-category 192 next end next end next end
Proxy addresses
To use local and remote categories in a proxy address in the GUI:
- Go to Policy & Objects > Addresses and click Create New > Address, or edit an existing proxy address.
- Set Category to Proxy Address.
- Set Type to URL Category.
- In the URL Category, add the local and remote categories.
- Configure the remaining settings as required, then click OK.
To use local and remote categories in a proxy address in the CLI:
config vdom edit root config firewall proxy-address edit "proxy_override" set type category set host "all" set category 140 192 set color 23 next end next end