FortiWeb
A FortiWeb can be configured to join a Security Fabric through the root or downstream FortiGate.
kmak
Staff
Staff
Article Id 327648
Description This article describes how to enable the HSTS preload header in FortiWeb and domain HSTS preloading list submission.
Scope FortiWeb.
Solution

Prerequisite:

  • The domain and all subdomain websites are HTTPS-ready and use valid SSL certificates.
  • FortiWeb v6.3.17 and above
  • HSTS preload header must be added to the root domain.

 

HSTS (HTTP Strict Transport Security) is a header that enforces the web browsers to connect to the domain/subdomain websites using HTTPS secure connection only. The HSTS 'preload' option is the additional variable added to the HSTS header, to add the domain into Chrome’s preload list. The HSTS preload list is hardcoded into Chrome as the list of websites that are connecting using HTTPS-secured connection only.

 

  1. Before making any configuration changes, check for the HSTS preload status and eligibility via the website 'hstspreload.org'. The example shows that the website ft-dev.site has no HSTS header present on the web response.

 

 

kmak_0-1721795328918.jpeg

 

  1. Log in to FortiWeb and navigate to the server policy of ft-dev.site. Open the Advanced SSL settings of the server policy.

 

kmak_1-1721795328923.jpeg

 

  1. In the Advanced SSL settings panel, expand the HTTPS Header Insertion. Enable the option Add HSTS Header. The HSTS header will have the default max age of 15552000 seconds which is equal to 180 days.

 

kmak_2-1721795328926.jpeg

 

  1. Save the default config and recheck the HSTS preload eligibility test result. The test result shall remain to fail as the HSTS preload requires that the header include subdomains and preload variables. The header max-age has a minimum requirement of 1 year too.

 

kmak_3-1721795328928.jpeg

 

  1. Go back to the FortiWeb server policy HTTPS Header Insertion settings panel. Change the max-age value to 31536000 (1 year) and enable both Include Sub Domains and Preload options.

 

kmak_4-1721795328931.jpeg

 

  1. Save the settings and recheck the HSTS preload eligibility test. The HSTS preload eligibility test should now be showing eligibility for HSTS preload submission.

 

kmak_5-1721795328933.jpeg

 

  1. The header can also be verified using the cURL command.

 

kmak_6-1721795328935.jpeg

 

Related document:

Configuring an HTTP server policy
Contributors