SlideShare a Scribd company logo
1 of 8
Download to read offline
FORTIGATE FIREWALL HOW TO
WEB FILTERING
www.ipmax.it
INTRODUCTION
In order to control which web sites are reachable by your client devices, a web filtering
policy is a must.
FortiGate allows you to block specific sites and also filter them on a content base.
Some sites are accessible either through http or https, in the following slides we will
show you how to enable web filtering and URL blocking on both protocols.
CONFIGURING WEB FILTERING FOR HTTP
In order to block sites on a content
base, a web filtering service profile
must be created.
Go to Security Profiles > Web Filter >
Profile and, on the upper right corner,
click on the «plus» button to create a
new service profile.
Give a name to the new service profile
and select Enable Web Site Filter in
case you want to block specific URLs.
Select FortiGuard Categories in case
you want to block web sites according
to their content.
CONFIGURING WEB FILTERING FOR HTTP -
CONTINUED
If you have chosen to block sites by URL, on the table below click on the Create New button.
Now you can specify which URL to block, for example *.libero.it, using * as a wildcard
character in order to block all subdomains of the site. Set the Type to Wildcard and the
Action to Block.
You can also enable Web Filtering by content together with URL blocking.
CONFIGURING WEB FILTERING FOR HTTP -
CONTINUED
If you have chosen to filter web pages by their
content, you could specify which content is
allowed and which one is blocked (see the picture
on the right). Then select apply to terminate the
Service Policy configuration.
As a last step, go to Policy > Policy > Policy and
modify the policy you are using to reach the
Internet: enable Web Filtering and specify the just
created Service Policy.
CONFIGURING WEB FILTERING FOR HTTPS
To enable web filtering for HTTPS too, go to Policy > Policy > SSL Inspection and select the
plus icon in the upper right corner to create a new profile.
Give a name to the new profile and enable the
HTTPS protocol.
Finally go to Policy > Policy > Policy and modify
the policy you are using to reach the Internet:
enable SSL Inspection and specify the just created
Service Policy.
MORE NEEDS?
See hints on www.ipmax.it
Or email us your questions to info_ipmax@ipmax.it
IPMAX
IPMAX is a Fortinet Partner in Italy.
IPMAX is the ideal partner for companies seeking quality in products and
services. IPMAX guarantees method and professionalism to support its
customers in selecting technologies with the best quality / price ratio, in the
design, installation, commissioning and operation.
IPMAX srl
Via Ponchielli, 4
20063 Cernusco sul Naviglio (MI) – Italy
+39 02 9290 9171

More Related Content

What's hot (20)

6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017Network Security - Fortinet, Dublin June 2017
Network Security - Fortinet, Dublin June 2017
 
FortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZFortiGate Firewall HOW-TO - DMZ
FortiGate Firewall HOW-TO - DMZ
 
F5 Networks: architecture and risk management
F5 Networks: architecture and risk managementF5 Networks: architecture and risk management
F5 Networks: architecture and risk management
 
Fortigate Training
Fortigate TrainingFortigate Training
Fortigate Training
 
Best Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-FiBest Practices on Migrating to 802.11ac Wi-Fi
Best Practices on Migrating to 802.11ac Wi-Fi
 
FortiWeb
FortiWebFortiWeb
FortiWeb
 
Palo alto networks next generation firewalls
Palo alto networks next generation firewallsPalo alto networks next generation firewalls
Palo alto networks next generation firewalls
 
F5 - BigIP ASM introduction
F5 - BigIP ASM introductionF5 - BigIP ASM introduction
F5 - BigIP ASM introduction
 
Transform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wanTransform your enterprise branch with secure sd-wan
Transform your enterprise branch with secure sd-wan
 
Meraki Overview
Meraki OverviewMeraki Overview
Meraki Overview
 
Fortinet
FortinetFortinet
Fortinet
 
Fortigate Firewall How to - DLP
Fortigate Firewall How to - DLPFortigate Firewall How to - DLP
Fortigate Firewall How to - DLP
 
Secure sd wan
Secure sd wanSecure sd wan
Secure sd wan
 
Vlan
VlanVlan
Vlan
 
Tableau Security Model.pptx
Tableau Security Model.pptxTableau Security Model.pptx
Tableau Security Model.pptx
 
BIG IP F5 GTM Presentation
BIG IP F5 GTM PresentationBIG IP F5 GTM Presentation
BIG IP F5 GTM Presentation
 
From Cisco ACS to ISE
From Cisco ACS to ISE From Cisco ACS to ISE
From Cisco ACS to ISE
 
SD-WAN
SD-WANSD-WAN
SD-WAN
 
VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)VRF (virtual routing and forwarding)
VRF (virtual routing and forwarding)
 

Viewers also liked

【FORTINET様】第3回SoftLayer勉強会資料
【FORTINET様】第3回SoftLayer勉強会資料【FORTINET様】第3回SoftLayer勉強会資料
【FORTINET様】第3回SoftLayer勉強会資料Tomoaki Suzuki
 
fortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notesfortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notesDrew Shearman
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsAltaware, Inc.
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníMarketingArrowECS_CZ
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Gol D Roger
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystemMark Oakton
 
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)志弘 李
 
CW4Sの手引き - Juniper SRX GUI設定支援ツール
CW4Sの手引き - Juniper SRX GUI設定支援ツールCW4Sの手引き - Juniper SRX GUI設定支援ツール
CW4Sの手引き - Juniper SRX GUI設定支援ツールJuniper Networks (日本)
 
Fortigate Hand Book
Fortigate Hand BookFortigate Hand Book
Fortigate Hand BookYusuf Usmani
 
Fortinet
FortinetFortinet
FortinetABEP123
 
vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~
vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~
vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~Juniper Networks (日本)
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationNCS Computech Ltd.
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Mohamed Al-Natour
 
Fortinet & VMware integration
Fortinet & VMware integrationFortinet & VMware integration
Fortinet & VMware integrationVMUG IT
 

Viewers also liked (19)

Fortigate 200 b-quickstart
Fortigate 200 b-quickstartFortigate 200 b-quickstart
Fortigate 200 b-quickstart
 
【FORTINET様】第3回SoftLayer勉強会資料
【FORTINET様】第3回SoftLayer勉強会資料【FORTINET様】第3回SoftLayer勉強会資料
【FORTINET様】第3回SoftLayer勉強会資料
 
fortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notesfortimanager-v5.0.10-release-notes
fortimanager-v5.0.10-release-notes
 
FortiGate-200B
FortiGate-200BFortiGate-200B
FortiGate-200B
 
Juniper Networks SRX Branch Solutions
Juniper Networks SRX Branch SolutionsJuniper Networks SRX Branch Solutions
Juniper Networks SRX Branch Solutions
 
Fortinet av
Fortinet avFortinet av
Fortinet av
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Advanced Threat Protection
Advanced Threat ProtectionAdvanced Threat Protection
Advanced Threat Protection
 
Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2Basic configuration fortigate v4.0 mr2
Basic configuration fortigate v4.0 mr2
 
Fortinet security ecosystem
Fortinet security ecosystemFortinet security ecosystem
Fortinet security ecosystem
 
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)
Fortinet Fortigate 60D 中文安裝手冊 ( Ver 5.2.3)
 
CW4Sの手引き - Juniper SRX GUI設定支援ツール
CW4Sの手引き - Juniper SRX GUI設定支援ツールCW4Sの手引き - Juniper SRX GUI設定支援ツール
CW4Sの手引き - Juniper SRX GUI設定支援ツール
 
Juniper
JuniperJuniper
Juniper
 
Fortigate Hand Book
Fortigate Hand BookFortigate Hand Book
Fortigate Hand Book
 
Fortinet
FortinetFortinet
Fortinet
 
vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~
vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~
vSRX on Your Laptop : PCで始めるvSRX ~JUNOSをさわってみよう!~
 
Fortinet FortiOS 5 Presentation
Fortinet FortiOS 5 PresentationFortinet FortiOS 5 Presentation
Fortinet FortiOS 5 Presentation
 
Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3Juniper Srx quickstart-12.1r3
Juniper Srx quickstart-12.1r3
 
Fortinet & VMware integration
Fortinet & VMware integrationFortinet & VMware integration
Fortinet & VMware integration
 

Similar to FortiGate Firewall How-To: WEB Filtering

What is Seo,smo,smm in digital marketing
What is Seo,smo,smm in digital marketingWhat is Seo,smo,smm in digital marketing
What is Seo,smo,smm in digital marketingTanuja Talekar
 
SEO-Search engine optimization by om sir's student Tanuja
SEO-Search engine optimization by   om sir's student  TanujaSEO-Search engine optimization by   om sir's student  Tanuja
SEO-Search engine optimization by om sir's student TanujaOM Maurya
 
SharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - AtidanSharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - AtidanDavid J Rosenthal
 
Seo Workshop
Seo WorkshopSeo Workshop
Seo Workshopmike andy
 
TWOHD_Search Monkey
TWOHD_Search MonkeyTWOHD_Search Monkey
TWOHD_Search MonkeyJH Lee
 
Tmg 2010
Tmg 2010Tmg 2010
Tmg 2010Dac Sah
 
Magento 2 Store Login Access Permissions Extension by IToris Inc.
Magento 2 Store Login Access Permissions Extension by IToris Inc.Magento 2 Store Login Access Permissions Extension by IToris Inc.
Magento 2 Store Login Access Permissions Extension by IToris Inc.Itexus LLC
 
Google analytics training
Google analytics trainingGoogle analytics training
Google analytics trainingrponting569
 
Bing web master tools
Bing web master toolsBing web master tools
Bing web master toolsncrajput
 
Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...
Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...
Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...Pam Ann Marketing
 
Search engine optimization ppt
Search engine optimization pptSearch engine optimization ppt
Search engine optimization pptpooja patil
 
The Ultimate Publisher's Need-to-Know Guide to Ad Blockers
The Ultimate Publisher's Need-to-Know Guide to Ad BlockersThe Ultimate Publisher's Need-to-Know Guide to Ad Blockers
The Ultimate Publisher's Need-to-Know Guide to Ad BlockersMitoc Group
 
Webmatrixppt
WebmatrixpptWebmatrixppt
Webmatrixpptyuvaraj72
 

Similar to FortiGate Firewall How-To: WEB Filtering (20)

Sp28989190 (1)
Sp28989190 (1)Sp28989190 (1)
Sp28989190 (1)
 
Sitecore experience platform part 2
Sitecore experience platform   part 2Sitecore experience platform   part 2
Sitecore experience platform part 2
 
Google Analytics Overview
Google Analytics OverviewGoogle Analytics Overview
Google Analytics Overview
 
What is Seo,smo,smm in digital marketing
What is Seo,smo,smm in digital marketingWhat is Seo,smo,smm in digital marketing
What is Seo,smo,smm in digital marketing
 
SEO-Search engine optimization by om sir's student Tanuja
SEO-Search engine optimization by   om sir's student  TanujaSEO-Search engine optimization by   om sir's student  Tanuja
SEO-Search engine optimization by om sir's student Tanuja
 
SharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - AtidanSharePoint - Empower People and Stay in Control - Atidan
SharePoint - Empower People and Stay in Control - Atidan
 
Seo Workshop
Seo WorkshopSeo Workshop
Seo Workshop
 
TWOHD_Search Monkey
TWOHD_Search MonkeyTWOHD_Search Monkey
TWOHD_Search Monkey
 
Manage and consume the api
Manage and consume the apiManage and consume the api
Manage and consume the api
 
Tmg 2010
Tmg 2010Tmg 2010
Tmg 2010
 
Magento 2 Store Login Access Permissions Extension by IToris Inc.
Magento 2 Store Login Access Permissions Extension by IToris Inc.Magento 2 Store Login Access Permissions Extension by IToris Inc.
Magento 2 Store Login Access Permissions Extension by IToris Inc.
 
Google analytics training
Google analytics trainingGoogle analytics training
Google analytics training
 
Configuration tips
Configuration tipsConfiguration tips
Configuration tips
 
Bing web master tools
Bing web master toolsBing web master tools
Bing web master tools
 
Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...
Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...
Technical SEO Checklist: How to Optimize a WordPress Site for Search Engine C...
 
Search engine optimization ppt
Search engine optimization pptSearch engine optimization ppt
Search engine optimization ppt
 
Lesson 4.pdf
Lesson 4.pdfLesson 4.pdf
Lesson 4.pdf
 
The Ultimate Publisher's Need-to-Know Guide to Ad Blockers
The Ultimate Publisher's Need-to-Know Guide to Ad BlockersThe Ultimate Publisher's Need-to-Know Guide to Ad Blockers
The Ultimate Publisher's Need-to-Know Guide to Ad Blockers
 
Analytics
AnalyticsAnalytics
Analytics
 
Webmatrixppt
WebmatrixpptWebmatrixppt
Webmatrixppt
 

More from IPMAX s.r.l.

Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortIPMAX s.r.l.
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatchHuawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatchIPMAX s.r.l.
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionHuawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionIPMAX s.r.l.
 
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
Huawei Switch S5700  How To - Configuring single-tag vlan mappingHuawei Switch S5700  How To - Configuring single-tag vlan mapping
Huawei Switch S5700 How To - Configuring single-tag vlan mappingIPMAX s.r.l.
 
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication ProtocolHuawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication ProtocolIPMAX s.r.l.
 
Huawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupHuawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupIPMAX s.r.l.
 
Huawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP AddressHuawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP AddressIPMAX s.r.l.
 
Huawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverHuawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverIPMAX s.r.l.
 
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP modeHUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP modeIPMAX s.r.l.
 

More from IPMAX s.r.l. (9)

Cisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch PortCisco Switch How To - Secure a Switch Port
Cisco Switch How To - Secure a Switch Port
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatchHuawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
Huawei ARG3 Router How To - Troubleshooting OSPF: Netmask mismatch
 
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID ConfusionHuawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
Huawei ARG3 Router How To - Troubleshooting OSPF: Router ID Confusion
 
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
Huawei Switch S5700  How To - Configuring single-tag vlan mappingHuawei Switch S5700  How To - Configuring single-tag vlan mapping
Huawei Switch S5700 How To - Configuring single-tag vlan mapping
 
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication ProtocolHuawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
Huawei SAN Storage How To - Configuring the i-SCSI Communication Protocol
 
Huawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setupHuawei SAN Storage How To - ISM management application setup
Huawei SAN Storage How To - ISM management application setup
 
Huawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP AddressHuawei SAN Storage How To - Assigning Management IP Address
Huawei SAN Storage How To - Assigning Management IP Address
 
Huawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP serverHuawei Switch How To - Configuring a basic DHCP server
Huawei Switch How To - Configuring a basic DHCP server
 
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP modeHUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
HUAWEI Switch HOW-TO - Configuring link aggregation in static LACP mode
 

Recently uploaded

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Recently uploaded (20)

Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

FortiGate Firewall How-To: WEB Filtering

  • 1. FORTIGATE FIREWALL HOW TO WEB FILTERING www.ipmax.it
  • 2. INTRODUCTION In order to control which web sites are reachable by your client devices, a web filtering policy is a must. FortiGate allows you to block specific sites and also filter them on a content base. Some sites are accessible either through http or https, in the following slides we will show you how to enable web filtering and URL blocking on both protocols.
  • 3. CONFIGURING WEB FILTERING FOR HTTP In order to block sites on a content base, a web filtering service profile must be created. Go to Security Profiles > Web Filter > Profile and, on the upper right corner, click on the «plus» button to create a new service profile. Give a name to the new service profile and select Enable Web Site Filter in case you want to block specific URLs. Select FortiGuard Categories in case you want to block web sites according to their content.
  • 4. CONFIGURING WEB FILTERING FOR HTTP - CONTINUED If you have chosen to block sites by URL, on the table below click on the Create New button. Now you can specify which URL to block, for example *.libero.it, using * as a wildcard character in order to block all subdomains of the site. Set the Type to Wildcard and the Action to Block. You can also enable Web Filtering by content together with URL blocking.
  • 5. CONFIGURING WEB FILTERING FOR HTTP - CONTINUED If you have chosen to filter web pages by their content, you could specify which content is allowed and which one is blocked (see the picture on the right). Then select apply to terminate the Service Policy configuration. As a last step, go to Policy > Policy > Policy and modify the policy you are using to reach the Internet: enable Web Filtering and specify the just created Service Policy.
  • 6. CONFIGURING WEB FILTERING FOR HTTPS To enable web filtering for HTTPS too, go to Policy > Policy > SSL Inspection and select the plus icon in the upper right corner to create a new profile. Give a name to the new profile and enable the HTTPS protocol. Finally go to Policy > Policy > Policy and modify the policy you are using to reach the Internet: enable SSL Inspection and specify the just created Service Policy.
  • 7. MORE NEEDS? See hints on www.ipmax.it Or email us your questions to info_ipmax@ipmax.it
  • 8. IPMAX IPMAX is a Fortinet Partner in Italy. IPMAX is the ideal partner for companies seeking quality in products and services. IPMAX guarantees method and professionalism to support its customers in selecting technologies with the best quality / price ratio, in the design, installation, commissioning and operation. IPMAX srl Via Ponchielli, 4 20063 Cernusco sul Naviglio (MI) – Italy +39 02 9290 9171