On this page
fortinet.fortios.fortios_webfilter_profile – Configure Web filter profiles in Fortinet’s FortiOS and FortiGate.
Note
This plugin is part of the fortinet.fortios collection (version 2.1.2).
You might already have this collection installed if you are using the ansible
package. It is not included in ansible-core
. To check whether it is installed, run ansible-galaxy collection list
.
To install it, use: ansible-galaxy collection install fortinet.fortios
.
To use it in a playbook, specify: fortinet.fortios.fortios_webfilter_profile
.
New in version 2.10: of fortinet.fortios
Synopsis
- This module is able to configure a FortiGate or FortiOS (FOS) device by allowing the user to set and modify webfilter feature and profile category. Examples include all parameters and values need to be adjusted to datasources before usage. Tested with FOS v6.0.0
Requirements
The below requirements are needed on the host that executes this module.
- ansible>=2.9.0
Parameters
Parameter | Choices/Defaults | Comments | ||||
---|---|---|---|---|---|---|
access_token
string
|
Token-based authentication. Generated from GUI of Fortigate.
|
|||||
enable_log
boolean
|
|
Enable/Disable logging for task.
|
||||
state
string / required
|
|
Indicates whether to create or remove the object.
|
||||
vdom
string
|
Default:
"root"
|
Virtual domain, among those defined previously. A vdom is a virtual instance of the FortiGate that can be configured and used as a different unit.
|
||||
webfilter_profile
dictionary
|
Configure Web filter profiles.
|
|||||
antiphish
dictionary
|
AntiPhishing profile.
|
|||||
authentication
string
|
|
Authentication methods.
|
||||
check_basic_auth
string
|
|
Enable/disable checking of HTTP Basic Auth field for known credentials.
|
||||
check_uri
string
|
|
Enable/disable checking of GET URI parameters for known credentials.
|
||||
check_username_only
string
|
|
Enable/disable acting only on valid username credentials. Action will be taken for valid usernames regardless of password validity.
|
||||
custom_patterns
list / elements=string
|
Custom username and password regex patterns.
|
|||||
category
string
|
|
Category that the pattern matches.
|
||||
pattern
string / required
|
Target pattern.
|
|||||
type
string
|
|
Pattern will be treated either as a regex pattern or literal string.
|
||||
default_action
string
|
|
Action to be taken when there is no matching rule.
|
||||
domain_controller
string
|
Domain for which to verify received credentials against. Source credential-store.domain-controller.server-name.
|
|||||
inspection_entries
list / elements=string
|
AntiPhishing entries.
|
|||||
action
string
|
|
Action to be taken upon an AntiPhishing match.
|
||||
fortiguard_category
string
|
FortiGuard category to match.
|
|||||
name
string / required
|
Inspection target name.
|
|||||
ldap
string
|
LDAP server for which to verify received credentials against. Source user.ldap.name.
|
|||||
max_body_len
integer
|
Maximum size of a POST body to check for credentials.
|
|||||
status
string
|
|
Toggle AntiPhishing functionality.
|
||||
comment
string
|
Optional comments.
|
|||||
extended_log
string
|
|
Enable/disable extended logging for web filtering.
|
||||
feature_set
string
|
|
Flow/proxy feature set.
|
||||
file_filter
dictionary
|
File filter.
|
|||||
entries
list / elements=string
|
File filter entries.
|
|||||
action
string
|
|
Action taken for matched file.
|
||||
comment
string
|
Comment.
|
|||||
direction
string
|
|
Match files transmitted in the session"s originating or reply direction.
|
||||
file_type
list / elements=string
|
Select file type.
|
|||||
name
string / required
|
File type name. Source antivirus.filetype.name.
|
|||||
filter
string / required
|
Add a file filter.
|
|||||
password_protected
string
|
|
Match password-protected files.
|
||||
protocol
string
|
|
Protocols to apply with.
|
||||
log
string
|
|
Enable/disable file filter logging.
|
||||
scan_archive_contents
string
|
|
Enable/disable file filter archive contents scan.
|
||||
status
string
|
|
Enable/disable file filter.
|
||||
ftgd_wf
dictionary
|
FortiGuard Web Filter settings.
|
|||||
exempt_quota
string
|
Do not stop quota for these categories.
|
|||||
filters
list / elements=string
|
FortiGuard filters.
|
|||||
action
string
|
|
Action to take for matches.
|
||||
auth_usr_grp
string
|
Groups with permission to authenticate.
|
|||||
name
string / required
|
User group name. Source user.group.name.
|
|||||
category
integer
|
Categories and groups the filter examines.
|
|||||
id
integer / required
|
ID number.
|
|||||
log
string
|
|
Enable/disable logging.
|
||||
override_replacemsg
string
|
Override replacement message.
|
|||||
warn_duration
string
|
Duration of warnings.
|
|||||
warning_duration_type
string
|
|
Re-display warning after closing browser or after a timeout.
|
||||
warning_prompt
string
|
|
Warning prompts in each category or each domain.
|
||||
max_quota_timeout
integer
|
Maximum FortiGuard quota used by single page view in seconds (excludes streams).
|
|||||
options
string
|
|
Options for FortiGuard Web Filter.
|
||||
ovrd
string
|
Allow web filter profile overrides.
|
|||||
quota
list / elements=string
|
FortiGuard traffic quota settings.
|
|||||
category
string
|
FortiGuard categories to apply quota to (category action must be set to monitor).
|
|||||
duration
string
|
Duration of quota.
|
|||||
id
integer / required
|
ID number.
|
|||||
override_replacemsg
string
|
Override replacement message.
|
|||||
type
string
|
|
Quota type.
|
||||
unit
string
|
|
Traffic quota unit of measurement.
|
||||
value
integer
|
Traffic quota value.
|
|||||
rate_crl_urls
string
|
|
Enable/disable rating CRL by URL.
|
||||
rate_css_urls
string
|
|
Enable/disable rating CSS by URL.
|
||||
rate_image_urls
string
|
|
Enable/disable rating images by URL.
|
||||
rate_javascript_urls
string
|
|
Enable/disable rating JavaScript by URL.
|
||||
https_replacemsg
string
|
|
Enable replacement messages for HTTPS.
|
||||
inspection_mode
string
|
|
Web filtering inspection mode.
|
||||
log_all_url
string
|
|
Enable/disable logging all URLs visited.
|
||||
name
string / required
|
Profile name.
|
|||||
options
list / elements=string
|
|
Options.
|
||||
override
dictionary
|
Web Filter override settings.
|
|||||
ovrd_cookie
string
|
|
Allow/deny browser-based (cookie) overrides.
|
||||
ovrd_dur
string
|
Override duration.
|
|||||
ovrd_dur_mode
string
|
|
Override duration mode.
|
||||
ovrd_scope
string
|
|
Override scope.
|
||||
ovrd_user_group
string
|
User groups with permission to use the override.
|
|||||
name
string / required
|
User group name. Source user.group.name.
|
|||||
profile
list / elements=string
|
Web filter profile with permission to create overrides.
|
|||||
name
string / required
|
Web profile. Source webfilter.profile.name.
|
|||||
profile_attribute
string
|
|
Profile attribute to retrieve from the RADIUS server.
|
||||
profile_type
string
|
|
Override profile type.
|
||||
ovrd_perm
list / elements=string
|
|
Permitted override types.
|
||||
post_action
string
|
|
Action taken for HTTP POST traffic.
|
||||
replacemsg_group
string
|
Replacement message group. Source system.replacemsg-group.name.
|
|||||
url_extraction
dictionary
|
Configure URL Extraction
|
|||||
redirect_header
string
|
HTTP header name to use for client redirect on blocked requests
|
|||||
redirect_no_content
string
|
|
Enable / Disable empty message-body entity in HTTP response
|
||||
redirect_url
string
|
HTTP header value to use for client redirect on blocked requests
|
|||||
server_fqdn
string
|
URL extraction server FQDN (fully qualified domain name)
|
|||||
status
string
|
|
Enable URL Extraction
|
||||
web
dictionary
|
Web content filtering settings.
|
|||||
allowlist
list / elements=string
|
|
FortiGuard allowlist settings.
|
||||
blacklist
string
|
|
Enable/disable automatic addition of URLs detected by FortiSandbox to blacklist.
|
||||
blocklist
string
|
|
Enable/disable automatic addition of URLs detected by FortiSandbox to blocklist.
|
||||
bword_table
integer
|
Banned word table ID. Source webfilter.content.id.
|
|||||
bword_threshold
integer
|
Banned word score threshold.
|
|||||
content_header_list
integer
|
Content header list. Source webfilter.content-header.id.
|
|||||
keyword_match
string
|
Search keywords to log when match is found.
|
|||||
pattern
string / required
|
Pattern/keyword to search for.
|
|||||
log_search
string
|
|
Enable/disable logging all search phrases.
|
||||
safe_search
list / elements=string
|
|
Safe search type.
|
||||
urlfilter_table
integer
|
URL filter table ID. Source webfilter.urlfilter.id.
|
|||||
whitelist
list / elements=string
|
|
FortiGuard whitelist settings.
|
||||
youtube_restrict
string
|
|
YouTube EDU filter level.
|
||||
web_antiphishing_log
string
|
|
Enable/disable logging of AntiPhishing checks.
|
||||
web_content_log
string
|
|
Enable/disable logging logging blocked web content.
|
||||
web_extended_all_action_log
string
|
|
Enable/disable extended any filter action logging for web filtering.
|
||||
web_filter_activex_log
string
|
|
Enable/disable logging ActiveX.
|
||||
web_filter_applet_log
string
|
|
Enable/disable logging Java applets.
|
||||
web_filter_command_block_log
string
|
|
Enable/disable logging blocked commands.
|
||||
web_filter_cookie_log
string
|
|
Enable/disable logging cookie filtering.
|
||||
web_filter_cookie_removal_log
string
|
|
Enable/disable logging blocked cookies.
|
||||
web_filter_js_log
string
|
|
Enable/disable logging Java scripts.
|
||||
web_filter_jscript_log
string
|
|
Enable/disable logging JScripts.
|
||||
web_filter_referer_log
string
|
|
Enable/disable logging referrers.
|
||||
web_filter_unknown_log
string
|
|
Enable/disable logging unknown scripts.
|
||||
web_filter_vbs_log
string
|
|
Enable/disable logging VBS scripts.
|
||||
web_ftgd_err_log
string
|
|
Enable/disable logging rating errors.
|
||||
web_ftgd_quota_usage
string
|
|
Enable/disable logging daily quota usage.
|
||||
web_invalid_domain_log
string
|
|
Enable/disable logging invalid domain names.
|
||||
web_url_log
string
|
|
Enable/disable logging URL filtering.
|
||||
wisp
string
|
|
Enable/disable web proxy WISP.
|
||||
wisp_algorithm
string
|
|
WISP server selection algorithm.
|
||||
wisp_servers
list / elements=string
|
WISP servers.
|
|||||
name
string / required
|
Server name. Source web-proxy.wisp.name.
|
|||||
youtube_channel_filter
list / elements=string
|
YouTube channel filter.
|
|||||
channel_id
string
|
YouTube channel ID to be filtered.
|
|||||
comment
string
|
Comment.
|
|||||
id
integer / required
|
ID.
|
|||||
youtube_channel_status
string
|
|
YouTube channel filter status.
|
Notes
Note
- Legacy fortiosapi has been deprecated, httpapi is the preferred way to run playbooks
Examples
- hosts: fortigates
collections:
- fortinet.fortios
connection: httpapi
vars:
vdom: "root"
ansible_httpapi_use_ssl: yes
ansible_httpapi_validate_certs: no
ansible_httpapi_port: 443
tasks:
- name: Configure Web filter profiles.
fortios_webfilter_profile:
vdom: "{{ vdom }}"
state: "present"
access_token: "<your_own_value>"
webfilter_profile:
antiphish:
authentication: "domain-controller"
check_basic_auth: "enable"
check_uri: "enable"
check_username_only: "enable"
custom_patterns:
-
category: "username"
pattern: "<your_own_value>"
type: "regex"
default_action: "exempt"
domain_controller: "<your_own_value> (source credential-store.domain-controller.server-name)"
inspection_entries:
-
action: "exempt"
fortiguard_category: "<your_own_value>"
name: "default_name_17"
ldap: "<your_own_value> (source user.ldap.name)"
max_body_len: "19"
status: "enable"
comment: "Optional comments."
extended_log: "enable"
feature_set: "flow"
file_filter:
entries:
-
action: "log"
comment: "Comment."
direction: "incoming"
file_type:
-
name: "default_name_30 (source antivirus.filetype.name)"
filter: "<your_own_value>"
password_protected: "yes"
protocol: "http"
log: "enable"
scan_archive_contents: "enable"
status: "enable"
ftgd_wf:
exempt_quota: "<your_own_value>"
filters:
-
action: "block"
auth_usr_grp:
-
name: "default_name_42 (source user.group.name)"
category: "43"
id: "44"
log: "enable"
override_replacemsg: "<your_own_value>"
warn_duration: "<your_own_value>"
warning_duration_type: "session"
warning_prompt: "per-domain"
max_quota_timeout: "50"
options: "error-allow"
ovrd: "<your_own_value>"
quota:
-
category: "<your_own_value>"
duration: "<your_own_value>"
id: "56"
override_replacemsg: "<your_own_value>"
type: "time"
unit: "B"
value: "60"
rate_crl_urls: "disable"
rate_css_urls: "disable"
rate_image_urls: "disable"
rate_javascript_urls: "disable"
https_replacemsg: "enable"
inspection_mode: "proxy"
log_all_url: "enable"
name: "default_name_68"
options: "activexfilter"
override:
ovrd_cookie: "allow"
ovrd_dur: "<your_own_value>"
ovrd_dur_mode: "constant"
ovrd_scope: "user"
ovrd_user_group:
-
name: "default_name_76 (source user.group.name)"
profile:
-
name: "default_name_78 (source webfilter.profile.name)"
profile_attribute: "User-Name"
profile_type: "list"
ovrd_perm: "bannedword-override"
post_action: "normal"
replacemsg_group: "<your_own_value> (source system.replacemsg-group.name)"
url_extraction:
redirect_header: "<your_own_value>"
redirect_no_content: "enable"
redirect_url: "<your_own_value>"
server_fqdn: "<your_own_value>"
status: "enable"
web:
allowlist: "exempt-av"
blacklist: "enable"
blocklist: "enable"
bword_table: "94 (source webfilter.content.id)"
bword_threshold: "95"
content_header_list: "96 (source webfilter.content-header.id)"
keyword_match:
-
pattern: "<your_own_value>"
log_search: "enable"
safe_search: "url"
urlfilter_table: "101 (source webfilter.urlfilter.id)"
whitelist: "exempt-av"
youtube_restrict: "none"
web_antiphishing_log: "enable"
web_content_log: "enable"
web_extended_all_action_log: "enable"
web_filter_activex_log: "enable"
web_filter_applet_log: "enable"
web_filter_command_block_log: "enable"
web_filter_cookie_log: "enable"
web_filter_cookie_removal_log: "enable"
web_filter_js_log: "enable"
web_filter_jscript_log: "enable"
web_filter_referer_log: "enable"
web_filter_unknown_log: "enable"
web_filter_vbs_log: "enable"
web_ftgd_err_log: "enable"
web_ftgd_quota_usage: "enable"
web_invalid_domain_log: "enable"
web_url_log: "enable"
wisp: "enable"
wisp_algorithm: "primary-secondary"
wisp_servers:
-
name: "default_name_124 (source web-proxy.wisp.name)"
youtube_channel_filter:
-
channel_id: "<your_own_value>"
comment: "Comment."
id: "128"
youtube_channel_status: "disable"
Return Values
Common return values are documented here, the following are the fields unique to this module:
Key | Returned | Description |
---|---|---|
build
string
|
always |
Build number of the fortigate image
Sample:
1547
|
http_method
string
|
always |
Last method used to provision the content into FortiGate
Sample:
PUT
|
http_status
string
|
always |
Last result given by FortiGate on last operation applied
Sample:
200
|
mkey
string
|
success |
Master key (id) used in the last call to FortiGate
Sample:
id
|
name
string
|
always |
Name of the table used to fulfill the request
Sample:
urlfilter
|
path
string
|
always |
Path of the table used to fulfill the request
Sample:
webfilter
|
revision
string
|
always |
Internal revision number
Sample:
17.0.2.10658
|
serial
string
|
always |
Serial number of the unit
Sample:
FGVMEVYYQT3AB5352
|
status
string
|
always |
Indication of the operation's result
Sample:
success
|
vdom
string
|
always |
Virtual domain used
Sample:
root
|
version
string
|
always |
Version of the FortiGate
Sample:
v5.6.3
|
Authors
- Link Zheng (@chillancezen)
- Jie Xue (@JieX19)
- Hongbin Lu (@fgtdev-hblu)
- Frank Shen (@frankshen01)
- Miguel Angel Munoz (@mamunozgonzalez)
- Nicolas Thomas (@thomnico)
© 2012–2018 Michael DeHaan
© 2018–2021 Red Hat, Inc.
Licensed under the GNU General Public License version 3.
https://docs.ansible.com/ansible/latest/collections/fortinet/fortios/fortios_webfilter_profile_module.html