Created on
‎03-27-2025
04:31 AM
Edited on
‎08-03-2025
10:22 PM
By
Jean-Philippe_P
Description |
This article describes a way to restrict the Access from an IP address range to websites according to the FQDN, which is hosted on only one Web Server with vhosts behind the FortiGate. |
Scope |
The LAB was built on FortiGate v7.4.4, but should be applied on any newest firmware versions. |
Solution |
Use of Virtual Servers configuration. In this case, there is no certificate, and port 80 is used to simplify the lab and the understanding of how the dynamic works.
Topology/diagram:
The External Devices Ext_PC_1, Ext_PC_2, and FortiGate WAN interface are using a Private IP address to represent the Public addresses:
The host file was used to have the name resolution for the External Devices to simulate a Public DNS database.
To accomplish this goal, it is necessary to segment the approach to better understand:
If it is necessary to have a certificate (SSL), it is also required to create also VS for each website to match the certificate SNI (another topic).
Website 1:
The results:
From China:
From Argentina:
Related documents: |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.