Hello guys.
Quick question: is there a way to completely bypass #Fortiweb (7.2.10) for specific URL request? For instance, suppose we have a web site with a config that looks something like this (this config inherits a default web protection profile which is shown at the end):
config waf web-protection-profile inline-protection
edit "Inline Protection - NO PERIOD BLOCK"
set client-management enable
unset threat-score-profile
set http-session-cookie disable
set http-session-timeout 1200
unset url-access-policy
set signature-rule "Protection - VERY LOW"
set x-forwarded-for-rule X-FORWARDED
unset parameter-validation-rule
unset hidden-fields-protection
set allow-method-policy "Allow Method Policy"
set url-rewrite-policy "URL Rewriting Policy"
unset http-authen-policy
set file-upload-policy WebShell
set webshell-detection-policy WebShell
unset file-exception-policy
set http-protocol-parameter-restriction "Standard Protection"
set redirect-url http://
set amf3-protocol-detection disable
set rdt-reason disable
set ip-list-policy BLOCKIP
unset file-compress-rule
set application-layer-dos-prevention "DoS Protection Policy"
unset geo-block-list-policy
set custom-access-policy "Predefined - Advanced Protection - Alert Only"
set ip-intelligence enable
set mobile-app-identification disable
unset token-secret
set token-header Jwt-Token
unset mobile-api-protection
unset site-publish-helper
unset cookie-security-policy
unset padding-oracle
set profile-id 655804019535001661
unset comment
set fortigate-quarantined-ips enable
set quarantined-ip-action alert_deny
set quarantined-ip-severity High
unset quarantined-ip-trigger
unset csrf-protection
unset mitb-protection
unset user-tracking-policy
unset http-header-security
unset xml-validation-policy
unset json-validation-policy
unset openapi-validation-policy
unset websocket-security-policy
unset cors-protection-policy
unset custom-response
set bot-mitigate-policy "Bot Mitigation"
unset api-management-policy
unset url-encryption-policy
set syntax-based-attack-detection "Protection - SQL/XSS Syntax Based Detection"
unset link-cloaking-policy
set owasp_api_top10_log_field enable
next
end
Hello Luis,
Thank you for using the Community Forum. I will seek to get you an answer or help. We will reply to this thread with an update as soon as possible.
Thanks,
Hi Luis,
Did you already have a look at this document?:
Regards,
Hello Anthony.
I believe we haven't tried that. We've tried several combinations (ex:. applying an empty web protection profile, adding urls to the allow list, etc), but nothing seemed to work.
The issue we're facing is that #Fortiweb will always "buffer" the HTTP reponse for chunked HTTP 1.1 responses if the returned chunks from the backend server are smaller than 512kb, When they're bigger, it seems like it will simply return everything as is to the client (which, btw, is what we want for a specific URL) instead of creating new chunks and returning them all at once.
Anyway, I'll give it a try and then I'll come back with our findings.
Thanks again and happy new year!
Hello again @Anthony_E .
I've just noticed that the link you've sent is for FortiGate and the question is about FortiWeb (https://community.fortinet.com/t5/FortiWeb/tkb-p/TKB34).
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1742 | |
1113 | |
759 | |
447 | |
241 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.