Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Fortigate not allowing connections to IP based URL

Posted on 2014-02-06
2
Medium Priority
?
1,555 Views
Last Modified: 2014-03-27
We have a FortiWiFi 40C protecting our network.

We need to connect to a site on the web that does not have a DNS name but only an IP address.

It tries to connect and says "this page cannot be displayed" and gives an option to fix connection problems?

if I try to connect to the same site using the WiFi connection on the same Fortigate it works fine, as well as from outside the network.

Is there some setting that has disabled connections to sites that use an IP address and not a "name" or is it possible that it checks reverse lookups and rejects the browse because of this ?

thank you
0
Comment
Question by:terryfos
  • 2
2 Comments
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 39843386
In the extreme to see if it is the box, disable the policy and see if the traffic goes through for IP and URL, else review the web filter rules and in particular this one below

http://docs-legacy.fortinet.com/cb/html/index.html#page/FOS_Cookbook/UTM/cb_utm_wf_check_ip_addresses.html

Also the web sites your users visit will be recorded in the UTM log. The default settings of the UTM log page do not display the URLs. Configure the log settings to display URLs. When you view the UTM log, the hostname column will display the domain name of site, and the URL will display the path of the file accessed on the host.

http://docs-legacy.fortinet.com/cb/html/index.html#page/FOS_Cookbook/UTM/cb_utm_wf_block_urls.html
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

How to set-up an On Demand, IPSec, Site to SIte, VPN from a Draytek Vigor Router to a Cyberoam UTM Appliance. A concise guide to the settings required on both devices
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…
Suggested Courses

877 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question