FortiOS 5.4 Online Help Link FortiOS 5.2 Online Help Link FortiOS 5.0 Online Help Link FortiOS 4.3 Online Help Link

Home > Online Help

> Chapter 1 - What's New for FortiOS 5.4 > Explicit web proxy

Explicit web proxy

This chapter describes new explicit web proxy features added to FortiOS 5.4.

Support Kerberos and NTLM authentication (370489)

FortiGate now recognizes the client's authentication method from the token and selects the correct authentication scheme to authenticate successfully.

CLI syntax

config firewall explicit-proxy-policy

edit <example>

set active-auth-method [ntlm | basic | digest | negotiate | none]

end

Explicit Web Proxy WISP support improvements (309388 309236)

The following Explicit Web Proxy WISP CLI syntax has been changed and added:

  • Changed web-proxy wisp to table object and added outgoing-ip.
CLI syntax

config web-proxy

set server-ip // WISP server IP address

set server-port // WISP server port (1 - 65535)

 

  • In the web filter profile, added WISP servers and WISP algorithm.
CLI syntax

config webfilter profile

edit <example>

set wisp-servers // WISP servers

set wisp-algorithm // WISP server selection algorithm

Improvements to explicit web proxy policy page (305817)

Explicit proxy URL categories show description next to their numerical values in the CLI. Also, all categories for URL Category are available in the GUI.

Explicit web proxy Kerberos authentication support (297503)

The following web proxy Kerberos authentication CLI syntax has been added:

CLI syntax

config user krb-keytab

edit <example>

set principal // Kerberos service principal

set ldap-server // LDAP server name

set keytab // base64 coded keytab

Explicit proxy, Web Caching, and WAN Optimization are not supported for Flow-based VDOMs (274748)

Explicit proxy, web caching, and WAN optimization have been removed from the GUI in a Flow-based VDOM.

Explicit proxy support for base64 encoded X-Authenticated-Groups and X-Authenticated-User HTTP headers (356979)

Data for http header-names X-Authenticated-Groups and X-Authenticated-User are decoded before further processing.

New explicit proxy firewall address types (284753)

New explicit proxy firewall address types improve granularity over header matching for explicit web proxy policies. You can enable this option using the Show in Address List button on the Address and Address Group New/Edit forms under Policy & Objects > Addresses.

The following new address types have been added:

  • URL Pattern - destination address
  • Host Regex Match - destination address
  • URL Category - destination address (URL filtering)
  • HTTP Method - source address
  • User Agent - source address
  • HTTP Header - source address
  • Advanced (Source) - source address (combines User Agent, HTTP Method, and HTTP Header)
  • Advanced (Destination) - destination address (combines Host Regex Match and URL Category)

Disclaimer messages can be added to explicit proxy policies (273208)

Disclaimer options are now available for each explicit proxy policy or split policy of ID-based policy. This feature allows you to create user exceptions for specific URL categories (including warning messages) based on user groups.

The Disclaimer Options are configured under Policy & Objects > Explicit Proxy Policy. You can also configure a disclaimer for each Authentication Rule by setting Action to Authenticate.

Disclaimer explanations
  • Disable: No disclaimer (default setting).
  • By Domain: The disclaimer will be displayed on different domains. The explicit web proxy will check the referring header to mitigate the javascript/css/images/video/etc page.
  • By Policy: The disclaimer will be displayed if the HTTP request matches a different explicit firewall policy.
  • By User: The disclaimer will be displayed when a new user logs on.

Firewall virtual IPs (VIPs) can be used with Explicit Proxy policies (234974)

The explicit web-proxy will now accept VIP addresses for destination address. If an external IP matches a VIP policy, the IP is changed to the mapped-IP of the VIP.

Implement Botnet features for explicit policy (259580)

The option scan-botnet-connections has been added to the firewall explicit proxy policy.

Syntax:

config firewall explicit-proxy-policy

edit <policyid>

set scan-botnet-connections [disable/block/monitor]

end

where:

disable means do not scan connections to botnet servers.

block means block connections to botnet servers.

monitor means log connections to botnet servers.

Add HTTP.REFERRER URL to web filter logs (260538)

Added support for the referrer field in the HTTP header on webfilter log, this field along with others in the HTTP header are very useful in heuristic analysis /search for malware infected hosts.

Adding guest management to explicit web proxy (247566)

Allow user group with type Guest to be referenced in explicit-proxy-policy.