- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Cannot apply default webfilter-profile to external Firewall policy, no error
Cannot apply default webfilter-profile to external Firewall policy. It fails with no error and I am not sure what I am doing wrong or how to correct this problem. I am following the guide below while using FortiManager Cloud:
I can apply the below settings:
application-list - default
av-profile - default
ips-sensor - default
ssl-ssh-profile - deep-inspection
However, when I configure:
webfilter-profile - default
The policy fails to apply with no error, see log below:
Solved! Go to Solution.
Created on ‎12-12-2024 09:01 AM Edited on ‎12-12-2024 09:02 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I solved this issue by configuring my firewall policy via the FortiManager Policy Package and deploying to the Fortigate that way.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi,
Verify the inspection mode on the firewall policy is flow/proxy and the feature set on the webfilter profile is flow/proxy. Make sure to have it same
Salon Raj Joshi
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
All policies and profiles are set to Flow already
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi @cschmidt-leolabs ,
Also please run the following commands before push:
diag debug cli 8
diag debug enable
Once you are done with the Push on FMG, disable the debug on FGT:
diag debug disable
diag debug cli 3
Then please share the outputs for further investigation.
Jerry
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I setup the debug messages but I'm not sure if I can see what the issue is from them...
testsr-fortigate # diag debug cli 8
Debug messages will be on for 15 minutes.
testsr-fortigate # diag debug enable
testsr-fortigate # 0: get sys status
-61: get system auto-scale
-61: diag sys ha checksum autoscale-cluster
-61: diag sys ha autoscale-peers
0: get system interface
0: get system interface physical
0: get hardware status
0: get mgmt-data status
0: diagnose test update info contract
0: get system mgmt-csum
0: config firewall policy
0: edit 8
0: set webfilter-profile "default"
0: next
0: end
0: get sys status
-61: get system auto-scale
-61: diag sys ha checksum autoscale-cluster
-61: diag sys ha autoscale-peers
0: get system interface
0: get system interface physical
0: get hardware status
0: get mgmt-data status
0: diagnose test update info contract
0: get system mgmt-csum
0: get sys status
-61: get system auto-scale
-61: diag sys ha checksum autoscale-cluster
-61: diag sys ha autoscale-peers
0: get system interface
0: get system interface physical
0: get hardware status
0: get mgmt-data status
0: diagnose test update info contract
0: get sys status
-61: get system auto-scale
-61: diag sys ha checksum autoscale-cluster
-61: diag sys ha autoscale-peers
0: get system interface
0: get system interface physical
0: get hardware status
0: get mgmt-data status
0: diagnose test update info contract
0: config firewall policy
0: edit 8
0: set webfilter-profile "default"
0: next
0: end
0: get sys status
-61: get system auto-scale
-61: diag sys ha checksum autoscale-cluster
-61: diag sys ha autoscale-peers
0: get system interface
0: get system interface physical
0: get hardware status
0: get mgmt-data status
0: diagnose test update info contract
0: get system mgmt-csum
0: get sys status
-61: get system auto-scale
-61: diag sys ha checksum autoscale-cluster
-61: diag sys ha autoscale-peers
0: get system interface
0: get system interface physical
0: get hardware status
0: get mgmt-data status
0: diagnose test update info contract
0: get sys status
0: get system central-management
0: get system ip-conflict status
0: get sys status
0: get system central-management
0: get system ip-conflict status
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello
Can you confirm if the default web filter profile on the FortiGate and is synced with FortiManager. Also check if it's in the correct VDOM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
They look the same but I have more profiles i Fortimanager than I do on the Fortigate.
I am not using any VDOMs
Created on ‎12-12-2024 09:01 AM Edited on ‎12-12-2024 09:02 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I solved this issue by configuring my firewall policy via the FortiManager Policy Package and deploying to the Fortigate that way.
