Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
config webfilter urlfilter edit 0 set name " Exempt_AV" config entries edit 0 set url " avupdate.example.com" set action exempt set exempt dlp next end next endI am just preparing some separate urlfilter lists for our next week' s test.
Thanks for the info but man is this frustrating. First off, why not put a check box "Exempt DLP" in the GUI. Having to go to the CLI for this kind of stuff is maddening!!
That being said it would be much easier to have a DLP Allow and DLP Block in the same sensor. That is sorely missed.
Create an allow filter first
Create a block filter second
It would be even better if you could associate hosts with files. So entering:
Host: gstatic.com (This should support wildcards due to the number of CDN sites in use)
File: f.txt
Action: Allow
Is a lot easier that digging through regex guides.
I don't think this works on 5.2.2. I just ran a test and if you choose "exempt" in the URL filter GUI, it enters the following in the CLI:
FG100D (37) # get
id : 37
url : download.piriform.com
type : simple
action : exempt
status : enable
exempt : av web-content activex-java-cookie dlp fortiguard range-block all
referrer-host :
What makes this confusing is if you review the FortiOS Handbook, it says the filters are processed in the following order:
Flow-Based
IPS
App Control
DLP
Web Filter
AV
Proxy-based Inspection Engine
DLP
Web
AV
So if I understand this correctly and you use Flow-Based (which appears to have all sorts of issues so I never do), it will process DLP before Web Filter with the same result if you use the Proxy-based engine. So how is exempting a URL going to to allow a file if the DLP engine is getting to it first?
I've had a hard time getting my head around the 5.X logical flow. 4.X seemed more sensible to me. Especially this:
Implicit fall-through feature for user authentication policies In FortiOS v5.2.0 user authentication policies have an implicit fall-through feature that causes policy matching to fall through to a policy lower on the list that can also match the traffic. In other words the first user policy that is matched in the policy list, based on standard policy criteria, isn’t the only policy that can be matched. To illustrate implicit fall-through, consider a FortiOS v5.2.0 policy list consisting of the following two policies: id 1: internal, (subnet1) ---> wan1, (all), service(all), has authentication id 2: internal, (subnet1) ---> wan1, (all), service(all), no authentication Since both policies have the same policy matching criteria the fall-through feature matches traffic with policy 2. The result of this policy list would be that no user would ever see a firewall authentication prompt. This is not the intention of the fall-through feature but a policy list like this could be created unintentionally. Especially after a firmware upgrade since this configuration was acceptable for FortiOS v5.2.0. Fall-through is intended to match users in different user groups with different policies. For example, consider an organization with two user groups where user group A requires a web filtering profile and user group B requires virus scanning. You could set up the following policy list: id 1: internal, (subnet1) ---> wan1, (all), service(all), user group A, Web Filtering profile id 2: internal, (subnet1) ---> wan1, (all), service(all), user group B, Antivrus profile In this configuration, all users from subnet1 will see an authentication prompt. If the user is found in user group A the traffic is accepted by policy 1 and is filtered by the Web Filtering profile. If the user is found in user group B the traffic is accepted by policy 2 and is virus scanned. The fall-through feature is required for users to be matched with policy 2. Without fall-through traffic would never be matched with policy 2.
Not sure how to resolve this DLP issue. Time to open a ticket.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1713 | |
1093 | |
752 | |
447 | |
231 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.