In FortiOS version V6.2 onwards, the external block list (threat feed) can be added into firewall policy.
In addition to using the external block list for web filtering and DNS, it can be used in firewall policies.
This article describes how to use the external block list.
This version includes the following new features:
1) Policy support for external IP list used as source/destination address.
2) Support for IPv4 and IPv6 firewall policy only. ACL, DoS, NAT64, NAT46, shaping, local-in policy are not supported.
3) Support for both CLI and GUI.
From version 7.2.4 and 7.4.0, the External Threat Feed object is now additionally supported in local-in policies. It can be added as a srcaddr or a dstaddr.
Go to Security Fabric -> Fabric Connectors -> Threat Feeds -> IP Address, create or edit an external IP list object.
The content of external feed can be monitored with the following API query:
access_token=Hnb9ccdd17y10xnp7zn1mjtwkQ0nwN where 'USOM' is the name of the external threat feed.
This API query will show both content of the feed and the latest status of feed update.
In case of a communication issue, the API query will report the status as 'error' similar to the
Following example :
The following URL will provide only the status of the External connector without the content of it :
Remark: In case of communication issues, FortiGate does not receive the updates but preserves the original file.
Below are the steps for configuring windows PC as an external server for a threat feed: