Description | This article describes how to allow access to sub-directories while blocking access to the parent domain. |
Scope | All versions. |
Solution |
In order to make this solution work, it is needed to enable Deep Packet Inspection, otherwise, the FortiGate will not be able to look beyond the certificate of the domain being used and will block access. This should not be confused with sub-domain filtering which is different and does not need DPI.
For this example, the domain 'www.fortinet.com' and the sub-directory 'http://www.fortinet.com/products/next-generation-firewall' will be used.
Step 1:
Step 2:
Note: be sure that the domain is not exempting (by default Fortinet domain is exempted so it is necessary to remove it in this example):
Step 3:
Step 4: Download and install the CA certificate to allow the FortiGate to be able to perform Deep Inspection:
1)
2)
3)
4)
5)
Confirm that the newly installed certificate is visible in the Computer Certificates and in the correct folder:
Step 5: Test the access to 'www.fortinet.com' - This should fail:
Test the access to 'www.fortinet.com/products/next-generation-firewall' - This should work:
|