Created on
04-10-2023
10:01 PM
Edited on
10-14-2025
07:07 AM
By
Stephen_G
| Description |
This article describes how to configure an External Threat Feed for Web Filtering. The reason to use an External Threat Feed URL is that it is a scalable and manageable option if there is an extensive Static URL list to Allow/Monitor/Block using Fortiguard Web Filter.
For example, if there are over 70,000+ URL entries in the web filter's static URL filter, this can cause scalability and manageability issues, whereby adding an entry can take a long time for the list to get updated, and the GUI can become very sluggish.
In addition to that, whereby duplicate URLs are inputted, and if each of the duplicates has a different action, it may cause FortiGate to incorrectly block the URL. Furthermore, with an External URL Threat Feed, it is easily possible to search for any potential duplicate URLs using the text editor's built-in features. |
| Scope | All FortiGate versions that are not End of Support. |
| Solution |
Example:
Accessed through Google Chrome:
In the GUI, go to Security Fabric -> External Connectors, select 'Create New', scroll down, and under Threat Feeds, select FortiGuard Category.
Note: To view the Security Policy tab under Policy & Objects, refer to the following article to enable policy-based NGFW mode: ngfw policy - FortiGate administration guide.
Example: FortiOS 7.4.7 version.
The external URL list can be found under FortiGuard Category Based Filter -> Remote Categories. Actions such as Allow, Monitor, Block, Warning, or Authenticate can be applied. In this case, for testing purposes, Block will be selected as seen in the screenshot above.
Results:
As cnn.com is a URL in the External URL Threat List, it is blocked. In the Category parameter of the Block message, it may belong to the External Connector that was configured earlier.
Note: The object that is created in the external connector for the FortiGuard category will be visible in the web filter remote category, but in IPv4 policy, it is not visible as the address object in source and destination addresses.
For any traffic that can potentially match to a policy with URL Category filtering then the PME will perform a FortiGuard category rating lookup. As long as url-category is used, a FortiGuard license is required, per design. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.