- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Blocking all traffic to server except one URL https connection, Fortigate 90e
Hi there guys, we are a company that develops software for a small company. We have developed an app that makes a connection to a box server in the company using Domino Access services. It is a REST API https connection. The app is making a GET request and server sends back data in JSON format. Our app is hosted in IBM Cloud and it has public url it uses for communication. The IT security of the company is managed by a different IT technical support company and they are using FortiGate 90e firewall. The person configuring this firewall was unable to quickly have a suitable solution on how to restrict EVERYTHING else from communicating with server except that one app that has dedicated URL. We tried to block connection based on IP, but since the app is hosted in the cloud IPs can change, we were given IP ranges by IBM, but they don't even match the IP of request of the app. So we are thinking on restricting everything except these https requests from an app that was given URL by IBM cloud in the form of: "myFancyApp.mybluemix.net." Can anyone please kindly guide us through making that nice helpful person through configuring his Fortigate 90e firewall to allow our app to communicate through firewall with that server and block everything else in the world ? We will appreciate any links to "cookbooks" and advice, thank you most kindly in advance.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
You can make it possible with static URL filter option in FortiGate.
1. First Line: First Simply allow the Simple URL (Your static URL)
2. Second Line: Block "mybluemix.net" with the wildcard.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi
WIth the IPv4 policy it still should be possible, given that either a) you know the IP address or range the http get request comes from or b) you can limit the origin of the http get request to an FQDN (or a number of them) and do not need to use a wildcard FQDN. This way you don't need to use a web filter at all. The policy would look something like the attached picture (you still can add multiple FQDNs to the source but not a wildcard FQDN).
By the way, I am just thinking, maybe it would be possible with the application control feature, but I'm not enough into it to tell you that exactly.
See if that works for you!
- « Previous
-
- 1
- 2
- Next »
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi
WIth the IPv4 policy it still should be possible, given that either a) you know the IP address or range the http get request comes from or b) you can limit the origin of the http get request to an FQDN (or a number of them) and do not need to use a wildcard FQDN. This way you don't need to use a web filter at all. The policy would look something like the attached picture (you still can add multiple FQDNs to the source but not a wildcard FQDN).
By the way, I am just thinking, maybe it would be possible with the application control feature, but I'm not enough into it to tell you that exactly.
See if that works for you!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Oh, we will explore this option ASAP with the firewall admin, thank you most kindly for your explanation and setting screenshot example.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I am so frustrated....i just bought huawei router....i work with a lot of clients, when i visit some client sites....i find them blocked....how on earth do i disable this thing....it is tempering with my ability to deliver....so frustrated PLEASE help me mndsibanda@gmail.com

- « Previous
-
- 1
- 2
- Next »