Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
ashok_kumar
New Contributor

Can' t block Twitter,Flicker and apple.com

Dear Friends, We are using Fortigate 200 Din our office . Almost unwanted sites are blocked via this fortigate,but unfortunately we cant block these three websites.Can any one help me on this issue. Thanks..

ashok kumar

Network Engineer

CCNP/MCSA

 

ashok kumar Network Engineer CCNP/MCSA
45 REPLIES 45
ashok_kumar

Look into the attachment.when am trying to block facebook automatically yammer also showing block mode

ashok kumar

Network Engineer

CCNP/MCSA

 

ashok kumar Network Engineer CCNP/MCSA
ashok_kumar

Right now its under monitor mode.so users are accessing Facebook as well as Yammer.

ashok kumar

Network Engineer

CCNP/MCSA

 

ashok kumar Network Engineer CCNP/MCSA
Nihas

Hi , As far my understanding , your requirements are, 1. Block Social Media Websites and unwanted sites . A. As all answered create a web filter profile with category wise / specific sites and apply on the firewall policy and make sure you have enabled SSL deep inspection. 2. Block the applications through application filter. 2.1 You need yammer to be accessed while all other sites are blocked. A1. Create a application sensor 2. Select the common threats like P2P, Botnet, Game , Social Media etc as " Block" 3. Create a new ' specific applicaton' filter whatever you want like yammer as " monitor" and place on top of the sensor. So it looks like 1. yammer -- monitor 2. botnet, p2p,social media - --block 3. all other applications - monitor and place the Application sensor on the firewall policy.
Nihas [\b]
Nihas [\b]
ashok_kumar

Yes already one policy we have am trying to edit that one

ashok kumar

Network Engineer

CCNP/MCSA

 

ashok kumar Network Engineer CCNP/MCSA
ashok_kumar

Yes its working.....

ashok kumar

Network Engineer

CCNP/MCSA

 

ashok kumar Network Engineer CCNP/MCSA
hklb
Contributor II

DNS resolves ' www.apple.com' to 23.211.11.213 HTTP Server Header: Apache SSL certificate Common Name = www.apple.com Subject Alternative Names = www.apple.com Issuer = Symantec Class 3 EV SSL CA - G3 Serial Number = 52C3FD89F2C5378450FE53AC1A747974 SHA1 Thumbprint = 2191CB76D235BC638904F43B0E70B913A43924C6 Key Length = 2048 bit Signature algorithm = SHA256 + RSA (excellent) Secure Renegotiation: Supported This certificate does not use a vulnerable Debian key (this is good) SSL Certificate has not been revoked OCSP Staple: Not Enabled OCSP Origin: Good CRL Status: Good SSL Certificate expiration The certificate expires April 16, 2016 (597 days from today) Certificate Name matches www.apple.com Subject www.apple.com Valid from 16/Apr/2014 to 16/Apr/2016 Issuer Symantec Class 3 EV SSL CA - G3 Subject Symantec Class 3 EV SSL CA - G3 Valid from 31/Oct/2013 to 30/Oct/2023 Issuer VeriSign Class 3 Public Primary Certification Authority - G5 Subject VeriSign Class 3 Public Primary Certification Authority - G5 Valid from 08/Nov/2006 to 07/Nov/2021 Issuer VeriSign, Inc. SSL Certificate is correctly installed Congratulations! This certificate is correctly installed.
the issuer is " Issuer = Symantec Class 3 EV SSL CA - G3 " .. So I dont' think it is your local CA! You don' t have SSL interception enabled.. Enable it and it should work (but you will need to deploy the CA)
Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors