Description |
This article describes how to troubleshoot the API Gateway Policy in FortiADC. |
Scope |
FortiADC 6.0.0 and later. |
Solution |
The most common issue in the FortiADC API Gateway is when even after adding Restrict Access IP, other IPs can still access the API.
In this scenario, the API is only accessible from these 2 IPs.
Troubleshooting steps should be followed as shown below:
The most common mistake at this point is to think about accessing the API from other IPs after checking and completing the configuration. However, the most important field is shown under the API gateway user and API gateway rule. While creating an API Gateway User as shown in the API Gateway Rule configuration below, two additional values are created: UUID and API KEY.
API Key should be used when generating the actual request with the HTTP Header name 'authkey'.
After finishing the configuration, the Security Log (WAF) log shows that the API is restricted from other IPs.
Related document: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.