| Description |
This article describes how, when FortiGate fails to connect to FortiGuard, the WebFilter blocks the requested web page from a client, although no administrator has set to block on the Web Filter profile. |
| Scope | FortiGate. |
| Solution |
Confirm that the website did not open because of a FortiGuard connection error. The event type in the security tab under forward traffic logs must be 'ftgd_err':
The FortiGate will generate the following traffic log for the blocked connection:
date=2025-09-23 time=22:57:54 eventtime=1758693473981849497 tz="-0700" logid="0318012800" type="utm" subtype="webfilter" eventtype="ftgd_err" level="error" vd="root" policyid=1 poluuid="1d2d97a6-23fd-51f0-e767-53626c96910b" policytype="policy" sessionid=199679 srcip=x.x.x.x srcport=65217 srccountry="Reserved" srcintf="port4" srcintfrole="undefined" srcuuid="a316a406-23e5-51f0-49ab-89c5b0494de7" dstip=y.y.y.y dstport=443 dstcountry="United States" dstintf="port1" dstintfrole="undefined" dstuuid="a316a406-23e5-51f0-49ab-89c5b0494de7" proto=6 service="HTTPS" hostname="fortinet.com" profile="default" action="blocked" reqtype="direct" url="https://www.fortinet.com/" sentbyte=246 rcvdbyte=0 direction="outgoing" msg="A rating error occurs" error="all Fortiguard servers failed to respond"
From the user side, a web page block message is prompted:
The connection was not allowed because the web filter is configured by default to 'block websites when a rating error occurs'. This can be changed with the following configuration: CLI Command:
config webfilter profile edit "<wf_profile>" config ftgd-wf set options error-allow end next end
For v7.4 and later versions, set the option Behavior when FortiGuard is unreachable to 'Allow all websites'.
Web Filter Log:
Note: If the FortiGate NGFW Mode is set to 'Policy-based', the 'Allow websites when a rating error occurs' feature will not be available in the GUI, nor will the 'config ftgd-wf' and 'set options error-allow' commands be available in the CLI under 'config webfilter profile'.
This feature is only available if the FortiGate NGFW mode is set to 'Profile-based', as URL categories can only be used in policies in 'Policy-based' NGFW mode. To verify what NGFW mode the FortiGate is in, use the following CLI commands:
FGT_3 (root) # config system settings FGT_3 (settings) # show full
To check via the GUI: under Navigate to System -> Settings and look for the 'NGFW Mode' setting.
Related articles: Technical Tip: URL filter to block top-level domain (TLD) names |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.