FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
gpap_FTNT
Staff
Staff
Article Id 193701

Description

 

This article describes how in FortiOS v5.4 introduced a new Web Application Firewall security profile.  
This feature allows the disabling of a particular signature if traffic to a web server is being blocked by the profile.


Scope

 

FortiGate and FortiWiFi units running FortiOS 5.4 and above.


Solution

 

Although an entire category of signatures can be enabled/disabled from the GUI, a specific signature within that category can only be disabled from the CLI by using its Signature ID, shown in the logs as Event ID.

jheadley_FD39276_tn_FD39276-1.jpg

From the CLI, enter the following commands:
 
config waf profile
    edit {Profile Name}
       config signature
            set disabled-signature {Event ID}
       end
    end
 
Note:
Be advised that if there an exemption where an attack signature has already been created and a new one is added, the new one will override the previous exemptions.
 
Example:
 
config waf profile
edit {Profile Name}
config signature
set disabled-signature 50140001 50140002 50140003
end
end

 

To add signature 50160002:

 

config waf profile

edit (Profile Name)

config signature

append disabled-signature 50160002

end

end

 

This allows the previous signature to be added without overriding the previous exemption.

 

To verify, see the signatures with the following command:

 

show full-configuration waf profile default | grep disabled-signature
set disabled-signature 50140001 50140002 50140003 50160002

 

In this example, 'default' is the name of the waf profile. Adjust the command to the WAF profile as needed.