Solved

Fortigate not allowing connections to IP based URL

Posted on 2014-02-06
2
1,002 Views
Last Modified: 2014-03-27
We have a FortiWiFi 40C protecting our network.

We need to connect to a site on the web that does not have a DNS name but only an IP address.

It tries to connect and says "this page cannot be displayed" and gives an option to fix connection problems?

if I try to connect to the same site using the WiFi connection on the same Fortigate it works fine, as well as from outside the network.

Is there some setting that has disabled connections to sites that use an IP address and not a "name" or is it possible that it checks reverse lookups and rejects the browse because of this ?

thank you
0
Comment
Question by:terryfos
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 64

Accepted Solution

by:
btan earned 500 total points
ID: 39843386
In the extreme to see if it is the box, disable the policy and see if the traffic goes through for IP and URL, else review the web filter rules and in particular this one below

http://docs-legacy.fortinet.com/cb/html/index.html#page/FOS_Cookbook/UTM/cb_utm_wf_check_ip_addresses.html

Also the web sites your users visit will be recorded in the UTM log. The default settings of the UTM log page do not display the URLs. Configure the log settings to display URLs. When you view the UTM log, the hostname column will display the domain name of site, and the URL will display the path of the file accessed on the host.

http://docs-legacy.fortinet.com/cb/html/index.html#page/FOS_Cookbook/UTM/cb_utm_wf_block_urls.html
0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Phishing is at the top of most security top 10 efforts you should be pursuing in 2016 and beyond. If you don't have phishing incorporated into your Security Awareness Program yet, now is the time. Phishers, and the scams they use, are only going to …
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…
In this video, viewers are given an introduction to using the Windows 10 Snipping Tool, how to quickly locate it when it's needed and also how make it always available with a single click of a mouse button, by pinning it to the Desktop Task Bar. Int…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question