FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
Cayazo
Staff
Staff
Article Id 335345
Description This article describes how to create a rule to whitelist or bypass traffic that is required to not be inspected, namely by using an object group to easily populate the list in the GUI.
Scope FortiGate.
Solution
  1. Go to Policy & Object -> Addresses:

Screenshot 2024-08-21 160447.jpg

 

 

  1. Choose the tab 'Address Group':

 

Screenshot 2024-08-21 160559.jpg

 

 

  1. Create new objects: one for IP addresses and one for URLs:

 

Screenshot 2024-08-21 161152.jpg

 

Screenshot 2024-08-21 161241.jpg

 

  1. Go to Policy & Object -> Firewall Policy:

 

Screenshot 2024-08-21 162947.jpg

 

 

  1. Create a new policy, and choose the LAN interface as a source, and set the destination to the WAN or SD-WAN interface:

 

Screenshot 2024-08-21 161757.jpg

 

  1. Choose the newly added object groups as the Source:

 

Screenshot 2024-08-21 161848.jpg

 

 

  1. Since the traffic will be forwarded to the Internet, enable Network Address Translation (NAT). To 'whitelist' or bypass the traffic the Security Profiles must be deactivated, and 'no-inspection' for 'SSL Inspection:

 

Screenshot 2024-08-21 162043.jpg

 

 

  1. In the logging section, for monitoring purposes, the option to be chosen is "All sessions", since 'Security Events' will only log Security (UTM) events (e.g. AV, IPS, firewall web filter) that are currently disabled.

 

Screenshot 2024-08-21 162126.jpg

 

Once the traffic is confirmed to be matching the policy, the logging can be disabled.

 

 

  1. Save the new policy.

  2. It is necessary to move the firewall policy to the top to avoid matching all the other firewall policies:

 

 

Recording-2024-08-21-170528.gif

 

 

  1. Now that the firewall policy is in place, edit the object group to add the IP addresses or URLs:

 

Screenshot 2024-08-21 165602.jpg

 

 

  1. In the section 'Select Entries', choose the option to add a new object, then choose address:

 

Screenshot 2024-08-21 171418.jpg

 

Screenshot 2024-08-21 171710.jpg

 

 

  1. For URLs, change the type to 'FQDN' and input the URL desired. Adding a wildcard is supported, but it is recommended to make sure that the DNS settings are properly set in order to populate the DNS resolutions to the FQDN objects properly.

 

Screenshot 2024-08-21 172100.jpg

 

 

  1. For IP addresses, choose the type 'Subnet'. This type supports subnets and specific IP addresses. To add a specific range of IP addresses, use the type 'IP Range'.

 

Screenshot 2024-08-21 172451.jpg

 

  1. Observe the new address object, added to the whitelist object group:
Screenshot 2024-08-21 172122.jpg

 

  1. Save the configuration once all of the object addresses are added, and confirm the configuration by hovering the mouse over the whitelist objects:
Recording-2024-08-21-174549.gif

Comments
lpedraza
Staff
Staff

Geat article @Carlos !!! Congratulations and thank you so much for your contribution!

Contributors