Description | This article describes how to enable implicit deny log when traffic matches the default implicit deny policy. |
Scope | FortiProxy v7.4 and v7.6. |
Solution |
The WAD debug log shows the traffic matches the policy ID '0', which is an implicit deny policy. But, there is no denying log generation. Use the following debugging command to display the traffic for the Explicit Proxy Service:
diagnose wad filter src 10.47.5.104
To stop the debug, run the commands:
The WAD debug output shows client 10.47.5.104 sends an HTTP request to https://activation.webex.com and matches the policy ID '0' Policy Denied: [V][p:1109][s:4] wad_nontp_cache_make :2171 Matched webproxy object web-proxy
By default, implicit deny logging is disabled in the Explicit Proxy Service. To enable logging for implicit deny or policy deny, it has to be done via CLI commands:
config log setting
Note: Enabling implicit deny logging will generate a huge volume of logs.
The logging denied traffic generates. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.