Hi everyone,
I am unsuccessfully trying to implement Web Filter Category quota on my 40F.
2 problems: despite time limit set under a monitored category, (1) client device has access to websites falling within that category beyond such time limit. And (2) in the Fortiguard Quota Monitor dashboard, FortiGate displays “No matching entries found” for this client IP.
Current setup:
What I can see:
Having been through the Troubleshooting Tip: FortiGuard Web Filtering problems, I am stuck in test 5. For recap and confirmation:
test #1: service enabled, but not sure to understand the meaning of the flags;
test #2: success;
test #3: success;
test #4: success.
I also tried to change the listened Explicit Proxy HTTP port to 8888, as well as in the Client settings. The FortiGate just recorded one second of access to the categorized website.
Am not an IT guy and am clearly doing something wrong. Hope you’ll give me some corrections/tips to move on.
Thanks !
Hello Sylvain,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
Hello Sylvain,
We are still looking for someone to help you.
We will come back to you ASAP.
Thanks,
Hi Sylvain,
If you are encountering the "No matching entries found" message when trying to add or view web filtering quotas in FortiOS 7.2.x, it indicates that no custom quotas or categories have been added yet:
Hi Anthony, many thanks for the follow up. Web Filter was set up adequately and selected in the Proxy Policy.
Hi,
I think the issue is in the fact that you are using Explict Proxy , instead of granting access directly to the devices w/o using a proxy.
In the documentation, https://docs.fortinet.com/document/fortigate/7.2.11/administration-guide/801136 , it states that a firewall policy should be in proxy mode and also the web filter and the category in question in Monitor.
Due to the fact that you are using a proxy address on the stations and a proxy policy with defines that traffic is allowed and not using a firewall policy because of that, most likely this would be the reason.
Hi, thank you for this.
Having checked with Support, I am now testing a Firewall Policy in proxy mode together with Explicit Proxy (no PAC file yet) and Category quota working on. Support added a deny firewall policy for quic. Confirmed in Firewall User Monitor showing 1 authenticated client in "Firewall", none in "Proxy". Forti Policies dashboard shows relevant firewall type policies.
But, I thought that I needed to set up a purely Proxy Policy to work this out. So if I disable that Firewall Policy in proxy mode and enable the corresponding Proxy Policy (same Web Filter and Category Quotas - except that SSL is set at handshake inspection only), why does this not work ?
The testing device gets internet access without prompting the interface authentication page anymore.
Forti Policies dashboard displays no Proxy type policy and the Implicit Deny Firewall type from root. No Proxy user in dashboard. Quota Dashboard shows the IP of testing device without timing data.
I am definitely missing something, as I can't seem to get the difference between a Firewall policy in proxy mode and a "true" Proxy policy. Googled that without success yet.
Created on 04-03-2025 05:50 AM Edited on 04-03-2025 05:50 AM
hi,
you could have a read here, https://docs.fortinet.com/document/fortigate/6.4.0/parallel-path-processing-life-of-a-packet/466137/...
so basically you have 2 options to grant users access.
1. with a explicit proxy - where the user sets a proxy ip:port in system settings ( +auth optionally ) and then it is granted access, no firewall policy needed, just a proxy policy with UTM profiles ( AV/Web Filter/DNS/etc )
2. with a firewall policy ( either in flow-mode or proxy-mode ) - where the user doesnt have to do anything in system settings , where you need a firewall policy to grant access based on source IP and dst IP/ISDB, also UTM profiles
with the 2nd option there are several options to auth users out there, AD polling/SSO/etc
User | Count |
---|---|
2276 | |
1236 | |
772 | |
452 | |
398 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.