I have a lot of user web traffic that is ultimately hitting the implicit deny because instead of matching the general 80/443 web rule we have in place with the appropriate UTM, it is hitting the implicit deny. The commonality with all of this traffic is that rather than being seen as SSL or web browser application traffic it is being seen as a CDN application (Akamai, Fastly, AWS, etc...).
I'm trying to determine what would be the best way to handle it. I thought about creating a clone of the standard web browsing rule and making it specific with CDN applications, but in the logs they all report as "unscanned" sites and I don't think the web filtering would work in those cases, which I fear would leave some holes I don't want.
Was hoping someone else has dealt with this, or something similar, and had a course of action they took.
Thanks!
Did you try using ISDB as destination?
CDN entries in ISDB:
This seems like a good option, but I just want to confirm, will ISDB based policies also apply the web filtering, application control, and other UTM features?
Hi @Sevro_Wolf ,
No. You can create a new firewall policy above the current one using any UTM features.
The new firewall policy uses the ISDB object as the destination and you may apply either Allow or Deny action for it.
When you select ISDB as destination you cannot select service (port number) since service is already defined in the ISDB object.
However it seems you still can select security profiles (AV, WF, APP, IPS, and so), which seems to me quite logical.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1747 | |
1114 | |
760 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.