index int64 0 4.08k | text stringlengths 34 4.9k ⌀ | url stringclasses 38
values |
|---|---|---|
2,755 | SSL VPN
a. Set Users/Groups to client2.
b. Set Portal to testportal2.
c. Click OK.
6. Click OK.
7. In the CLI, enable SSL VPN client certificate restrictive and set the user peer to pki:
config vpn ssl settings
config authentication-rule
edit 1
set client-cert enable
set user-peer "pki"
next
end
end
To create a firewal... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,756 | SSL VPN
To configure the SSL VPN server (FGT-B) in the CLI:
1. Create a local user:
config user local
edit "client2"
set passwd **********
next
end
2. Create a PKI user:
config user peer
edit "pki"
set ca "CA_Cert_3"
set cn "*.fos.automation.com"
next
end
3. Create a new SSL VPN portal:
config vpn ssl web portal
edit "... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,757 | SSL VPN
5. Create a firewall address and policy. The destination addresses used in the policy are routed to the SSL VPN
server.
config firewall address
edit "bing.com"
set type fqdn
set fqdn "www.bing.com"
next
end
config firewall policy
edit 2
set name "sslvpn2"
set srcintf "ssl.root"
set dstintf "port1"
set srcaddr "... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,758 | SSL VPN
a. Set the Name to sslclient_port1.
b. Set Interface to port1.
c. Under Administrative Access, select HTTPS and PING.
d. Click OK.
3. Configure the SSL VPN client:
Name sslclientTo9
Interface sslclient_port1
Server 172.16.200.9
Port 1443
Username client2
Pre-shared Key **********
Client Certificate fgtb_gui_aut... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,759 | SSL VPN
Incoming Interface port2
Outgoing Interface sslclient_port1
Source all
Destination all
Schedule always
Service ALL
Action Accept
3. Click OK.
To configure the SSL VPN client (FGT-A) in the CLI:
1. Create the PKI user. Use the CA that signed the certificate fgt_gui_automation, and the CN of that certificate on t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,760 | SSL VPN
set name "policy_to_sslvpn_tunnel"
set srcintf "port2"
set dstintf "sslclient_port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set nat enable
next
end
Verification
After the tunnel is established, the route to 13.107.21.200 and 204.79.197.200 on FGT-A connects... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,761 | SSL VPN
C *> 2000:10:1:100::/64 via ::, port2, 03:26:35
C *> 2000:172:16:200::/64 via ::, port1, 03:26:35
C *> 2001:1::1:100/128 via ::, sslclient_port1, 00:00:01
C *> fe80::/64 via ::, port2, 03:26:35
To check the connection in the GUI:
1. On the SSL VPN server FortiGate (FGT-B), go to Dashboard > Network and expand t... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,762 | SSL VPN
FortiGate A is an SSL VPN client that connects to FortiGate B to establish an SSL VPN tunnel connection. It attempts to
access www.bing.com and www.apple.com via separate IPv4 and IPv6 connections. Two addresses are configured on
FortiGate B:
l bing.com uses IPv4 FQDN and resolves to 13.107.21.200 and 204.79.19... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,763 | SSL VPN
d. For Source IP Pools, add SSLVPN_TUNNEL_ADDR1.
e. Enable IPv6 Tunnel Mode and for Enable Split Tunneling, select Enable Based on Policy Destination.
f. For Source IP Pools, add SSLVPN_TUNNEL_IPv6_ADDR1.
g. Enable Enable Web Mode.
h. Click OK.
4. Configure the SSL VPN settings:
FortiOS 7.6.2 Administration Gui... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,764 | SSL VPN
a. Go to VPN > SSL-VPN Settings and configure the following:
Listen on Interface(s) port1
Listen on Port 1443
Restrict Access Allow access from any host
Server Certificate fgt_gui_automation
Address Range Automatically assign addresses
DNS Server Same as client system DNS
Authentication/Portal
Mapping
Edit the ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,765 | SSL VPN
Outgoing Interface port2
Source all (IPv4), all (IPv6), client2
Destination bing.com, apple_v6
Schedule Always
Service All
NAT Enabled
c. Click OK.
To configure FortiGate A as an SSL VPN client in the GUI:
1. Create a peer to verify the server certificate:
The PKI menu is only available in the GUI (User & Authe... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,766 | SSL VPN
iv. Click OK.
c. Configure the SSL VPN client:
Name sslclientTo9
Interface sslclient_port2
Server Either IPv4 address 10.1.100.9 or IPv6 address 2000:10:1:100::9 can be
used and will have the same results.
Port 1443
Username client2
Pre-shared Key ******
Peer fgt_gui_automation
Status Enabled
d. Click OK.
To co... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,767 | SSL VPN
6. Click Save.
7. Enter the password, then click Connect.
To configure an SSL VPN server in tunnel and web mode with dual stack support in the CLI:
1. Create a local user:
config user local
edit "client1"
set type password
set passwd ******
next
end
2. Configure the addresses:
config firewall address
edit "bing... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,768 | SSL VPN
set split-tunneling enable
set ipv6-split-tunneling enable
next
end
4. Configure the SSL VPN settings:
config vpn ssl settings
set servercert "fgt_gui_automation"
set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1"
set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
set port 1443
set source-interface "port1"
set source-addr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,769 | SSL VPN
next
end
3. Configure the SSL VPN client. Either IPv4 address 10.1.100.9 or IPv6 address 2000:10:1:100::9 can be used and
will have the same results:
config vpn ssl client
edit "sslclientTo9"
set interface "sslclient_port2"
set user "client2"
set psk ******
set peer "fgt_gui_automation"
set server {10.1.100.9 |... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,770 | SSL VPN
S *> 0.0.0.0/0 [10/0] via 172.16.200.254, port1
C *> 10.0.1.0/24 is directly connected, link_11
C *> 10.1.100.0/24 is directly connected, port2
C *> 10.212.134.200/32 is directly connected, sslclient_port2
S *> 13.107.21.200/32 [10/0] is directly connected, sslclient_port2
C *> 172.16.200.0/24 is directly conne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,771 | SSL VPN
3.565929 port2 in 2600:140a:c000:385::1aca -> 2000:172:16:200::9: icmp6: echo reply seq
1 [flowlabel 0x1fdff]
3.565953 ssl.root out 2600:140a:c000:385::1aca -> fdff:fff::1: icmp6: echo reply seq 1
[flowlabel 0x1fdff]
...
Testing dual stack with web mode
In SSL VPN web mode, users can access both IPv4 and IPv6 b... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,772 | SSL VPN
4. Click the apple bookmark. The apple page will open over IPv4.
Disable the clipboard in SSL VPN web mode RDP connections
In web portal profiles, the clipboard can be disabled for SSL VPN web mode RDP/VNC connections. User will not be
able to copy and paste content to or from the internal server.
Example
In th... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,773 | SSL VPN
6. Click Create New again.
7. Enter a name for the portal, such as testportal2.
8. Enable Enable Web Mode and disable RDP/VNC clipboard to prevent copying and pasting.
9. Configure the remaining settings as needed.
10. Click OK.
To configure the SSL VPN settings in the GUI:
1. Go to VPN > SSL-VPN Settings.
2. S... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,774 | SSL VPN
To configure a firewall policy for SSL VPN in the GUI:
1. Go to Policy & Objects > Firewall Policy and click Create New.
2. Set a name for the policy, such as policy_to_sslvpn_tunnel.
3. Set Incoming Interface to the SSL VPN tunnel interface and Outgoing Interface to port1.
4. Set Source to the users, u1 and u2... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,775 | SSL VPN
4. Log out of the web portal, then log back in as user u2 and access the internal server using RDP/VNC.
The clipboard is disabled.
To configure the SSL-VPN portals and settings in the CLI:
1. Configure the SSL VPN portals:
config vpn ssl web portal
edit "testportal1"
set web-mode enable
set clipboard enable
...... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,776 | SSL VPN
set users "u1"
set portal "testportal1"
next
edit 2
set users "u2"
set portal "testportal2"
next
end
end
3. Configure a firewall policy for SSL VPN:
config firewall policy
edit 1
set name "policy_to_sslvpn_tunnel"
set srcintf "ssl.vdom1"
set dstintf "port1"
set action accept
set srcaddr "all"
set dstaddr "all"
... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,777 | SSL VPN
SSL VPN IP address assignments
When a user disconnects from a VPN tunnel, it is not always desirable for the released IP address to be used
immediately. In SSL VPN, IP addresses can be assigned from the pool in a round robin fashion, instead of the default
first-available address method.
Example
In this example... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,778 | SSL VPN
config vpn ssl settings
set dual-stack-mode enable
set tunnel-addr-assigned-method round-robin
end
By default, the IP pool assignment follows the first available rule.
4. Create two users and assign them to an SSL VPN policy:
config user local
edit "u1"
set type password
set passwd **********
next
edit "u2"
set... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,779 | SSL VPN
1 u2 1(1) N/A 10.1.100.254 0/0 0/0 0
SSL-VPN sessions:
Index User Group Source IP Duration I/O Bytes Tunnel/Dest IP
0 u1 10.1.100.145 44 90126/70405
173.10.1.1,2000::ad0a:101
1 u2 10.1.100.254 10 10563/8158
173.10.1.2,2000::ad0a:102
3. Log user u1 off of PC1, then log them back in and check that the assigned IP... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,780 | SSL VPN
To create a zone that includes the port4 and ssl.root interfaces in the GUI:
1. Go to Network > Interfaces and click Create New > Zone.
2. Set the name of the zone, such as zone_sslvpn_and_port4.
3. Add port4 and ssl.root to the Interface members.
4. Click OK.
To configure SSL VPN settings in the GUI:
1. Go to ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,781 | SSL VPN
6. Click Apply.
To configure a firewall policy with the zone as the source interface in the GUI:
1. Go to Policy & Objects > Firewall Policy and click Create New.
2. Set the policy name, such as policy_to_sslvpn_tunnel.
3. Set Incoming Interface to zone_sslvpn_and_port4.
4. Set Outgoing Interface to port1.
5. C... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,782 | SSL VPN
config vpn ssl settings
set servercert "fgt_gui_automation"
set tunnel-ip-pools "SSLVPN_TUNNEL_ADDR1"
set tunnel-ipv6-pools "SSLVPN_TUNNEL_IPv6_ADDR1"
set dns-server1 8.8.8.8
set dns-server2 8.8.4.4
set port 1443
set source-interface "port2"
set source-address "all"
set source-address6 "all"
set default-portal ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,783 | SSL VPN
4. Enter the Username and Password, then click Login.
5. Access the server using the bookmark.
SSL VPN troubleshooting
The following topics provide information about SSL VPN troubleshooting:
l Debug commands on page 2784
l Troubleshooting common issues on page 2785
Debug commands
SSL VPN debug command
Use the f... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,784 | SSL VPN
[282:root]SSL state:SSLv3 read finished A (172.20.120.12)
[282:root]SSL state:SSL negotiation finished successfully (172.20.120.12)
[282:root]SSL established: DHE-RSA-AES256-SHA SSLv3 Kx=DH Au=RSA Enc=AES(256) Mac=SHA1
To disable the debug:
diagnose debug disable
diagnose debug reset
Remote user authentication ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,785 | SSL VPN
c. Check that you are using the correct port number in the URL. Ensure FortiGate is reachable from the computer.
ping <FortiGate IP>
d. Check the browser has TLS 1.1, TLS 1.2, and TLS 1.3 enabled.
To troubleshoot FortiGate connection issues:
1. Check the Release Notes to ensure that the FortiClient version is c... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,786 | SSL VPN
To troubleshoot slow SSL VPN throughput:
Many factors can contribute to slow throughput.
This recommendation tries to improve throughput by using the FortiOS Datagram Transport Layer Security (DTLS)
tunnel option, available in FortiOS 5.4 and above.
DTLS allows SSL VPN to encrypt traffic using TLS and uses UDP ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,787 | User & Authentication
In User & Authentication, you can control network access for different users and devices in your network. FortiGate
authentication controls system access by user group. By assigning individual users to the appropriate user groups you
can control each user’s access to network resources. You can def... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,788 | User & Authentication
User definition, groups, and settings
FortiGate authentication controls system access by user groups. By assigning individual users to the appropriate user
groups, this controls each user’s access to network resources. The user groups members are user accounts, of which
there are several types. Lo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,789 | User & Authentication
To create a user:
1. Go to User Authentication > User Definition and click Create New. The Users/Groups Creation Wizard appears.
2. Select a User Type and click Next.
3. The remaining wizard steps depend on the user type:
l Local User:
i. Enter a Username and Password, then click Next.
ii. Option... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,790 | User & Authentication
l Remote RADIUS User and Remote TACACS+ User:
i. Enter a Username and select the server.
ii. Click Next.
iii. Optionally, enable Two-factor Authentication and configure the settings as needed.
iv. Click Next, then click Submit.
l FSSO:
i. Select an FSSO Agent, click the + to add AD Groups, then cl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,791 | User & Authentication
There are two options to add users in a firewall group configuration: members or remote groups. Members are the
individual users who have been defined in FortiOS. Remote groups are remote server that users may authenticate to.
One or more user groups can be specified within that server to limit wh... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,792 | User & Authentication
6. Select HR, then right-click and select Add Selected.
7. Click OK.
Both user group paths are specified under the Group Name.
8. Click OK.
In this configuration, shudson and tflenderson would be able to authenticate to this group.
FortiOS 7.6.2 Administration Guide 2793
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,793 | User & Authentication
Example 2: combining remote groups and local users in a user group
In this example, the firewall group (SSL_VPN_ACCESS) is configured to contain the HR remote group and a local LDAP
user (shudson) with multi-factor authentication.
To combine remote groups and local users in a user group:
1. Go to ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,794 | User & Authentication
To add a user as a member and their group as a remote groups:
1. Refer to example 1 to configure the two remote groups.
2. In the Members field, click the + and add shudson.
3. Click OK.
One unwanted scenario from this configuration is that a user might be able to bypass multi-factor authenticatio... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,795 | User & Authentication
Configuring RSSO user groups
RADIUS single sign-on user groups leverage a RADIUS server to authenticate connecting users. This requires users to
log in to their computer using their RADIUS account. The FortiGate does not interact with the remote RADIUS server. It
only monitors RADIUS accounting re... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,796 | User & Authentication
3. Configure the following:
Batch Guest Account
Creation
Create multiple accounts automatically. When enabled:
l The user ID and password are automatically generated.
l The accounts only have user ID, password, and expiration fields. The
expiration field is editable in the GUI in the Start Countdo... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,797 | User & Authentication
To manually create a guest user account:
1. Go to User & User & Authentication > Guest Management.
2. If more than one guest user group is configured, select the group from the dropdown beside the search box.
3. Click Create New and enter the information in the Create User pane. The fields are bas... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,798 | User & Authentication
l Lockouts on page 2801
l Authentication policy extensions on page 2802
Only some of the settings can be configured in the GUI.
To configure authentication settings in the GUI:
1. Go to User & Authentication > Authentication Settings.
2. Configure the following settings:
Setting Description
Authen... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,799 | User & Authentication
To configure timeout for authenticated users:
config user setting
set auth-timeout-type {idle-timeout | hard-timeout | new-session}
set auth-timeout <integer>
end
To configure the authentication timeout for a user group:
config user group
edit <name>
set authtimeout <integer>
next
end
If the group... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,800 | User & Authentication
The selected protocols control which protocols support the authentication challenge. Users must connect with a
supported protocol first so that they can subsequently connect with other protocols. If HTTPS is selected as a protocol
support method, it allows the user to authenticate with a customize... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,801 | User & Authentication
Authentication policy extensions
By default, unauthenticated traffic is permitted to fall to the next policy. This means that unauthenticated users are only
forced to authenticate against a policy when there are no other matching policies. To avoid this, you can force
authentication to always take... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,802 | User & Authentication
Retail environment guest access
Businesses such as coffee shops provide free Internet access for customers. In this scenario, you do not need to
configure guest management, as customers can access the WiFi access point without logon credentials.
However, consider that the business wants to contact... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,803 | User & Authentication
To create a firewall policy:
config firewall policy
edit 3
set srcintf "freewifi"
set dstintf "wan1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ALL"
set nat enable
set email-collect enable
next
end
Checking for collected emails
When a WiFi user connect... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,804 | User & Authentication
4. Click the Collected Email to expand to full view. The list of emails is displayed.
5. Optionally, click Export to export the data as a CSV or JSON file.
To check for collected emails in the CLI:
# diagnose firewall auth mac list
72:4d:e1:**:**:**, admin@fortinet.com
type: email, id: 0, duration... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,805 | User & Authentication
min-number <integer> Set the minimum number of numeric characters in the password (0 - 128, default
= 0).
min-change-characters
<integer>
Set the minimum number of unique characters in new password, which do not
exist in the old password (0 - 128, default = 0). This attribute overrides reusepassw... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,806 | User & Authentication
config user password-policy
edit "1"
set expire-days 1
set warn-days 1
set expired-password-renewal enable
set min-lower-case-letter 1
set min-upper-case-letter 1
set min-non-alphanumeric 3
set min-number 3
set min-change-characters 2
set expire-status enable
set reuse-password disable
next
end
3.... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,807 | User & Authentication
v. Click OK.
Sample prompt when a local user needs to update their password for firewall authentication:
FortiOS 7.6.2 Administration Guide 2808
Fortinet Inc. | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,808 | User & Authentication
Sample prompt when a local user needs to update their password for SSL VPN portal access:
Basic authentication with cached client certificates
With basic authentication, client certificates can be cached and used as authentication cookies, eliminating the need for
repeated user authentication.
In ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,809 | User & Authentication
config authentication rule
edit "test"
set srcaddr "all"
set ip-based disable
set active-auth-method "test"
set cert-auth-cookie enable
next
end
4. Configure verification of the client certificate with the root CA.
config authentication setting
set user-cert-ca "root_ca"
end
When the user accesses... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,810 | User & Authentication
FortiGate also logs the first access in the traffic log:
9: date=2024-04-24 time=12:28:51 eventtime=1713918531092354265 tz="+1200"
logid="0005000024" type="traffic" subtype="ztna" level="notice" vd="vdom1"
srcip=10.1.100.59 srcport=63615 srcintf="port2" srcintfrole="undefined"
dstcountry="United S... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,811 | User & Authentication
l Configuring LDAP dial-in using a member attribute on page 2816
l Configuring wildcard admin accounts on page 2817
l Configuring least privileges for LDAP admin account authentication in Active Directory on page 2819
l Tracking users in each Active Directory LDAP group on page 2819
l Tracking rol... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,812 | User & Authentication
Exchange server Enable to specify the exchange server connector to collect information about
authenticated users from a corporate exchange server. See Exchange Server
connector on page 3789 for more details.
Bind Type Select one of the following options:
l Simple: bind using simple password authen... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,813 | User & Authentication
The FortiGate checks the connection and updates the Connection Status.
To configure a secure connection to the LDAP server in the GUI:
1. Go to User & Authentication > LDAP Servers.
2. Click Create New.
3. Configure the following:
Name LDAP-fortiad
Server IP/Name 10.88.0.1
Server Port 636
Common N... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,814 | User & Authentication
set username "fortiad\\Administrator"
set password <password>
set secure ldaps
set ca-cert "CA_Cert_1"
set port 636
next
end
To account for dynamic IP address changes, such as those governed by SD-WAN rules,
interface names can be used to define the source IP addresses in RADIUS, LDAP, and DNS
con... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,815 | User & Authentication
set username "cn=Administrator,cn=users,dc=fortinet-fsso,dc=com"
set password XXXXXXXXXXXXXXXXXXXXXXXX
set search-type recursive
next
end
The search results now include groups that have other groups as members:
diagnose test authserver ldap ldap-ad nuser nuser
authenticate 'nuser' against 'ldap-ad... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,816 | User & Authentication
end
To ensure that you configured the settings correctly:
Users that are members of the ldap_grp user group should be able to authenticate. The following shows sample
diagnose debug output when the Allow Dial-in attribute is set to TRUE:
get_member_of_groups-Get the memberOf groups.
get_member_of_... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,817 | User & Authentication
When configuring an LDAP connection to an Active Directory server, an administrator must
provide Active Directory user credentials. To secure this connection, use LDAPS on both the
Active Directory server and FortiGate. See Configuring an LDAP server on page 2812 and
Configuring client certificate... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,818 | User & Authentication
edit "test"
set remote-auth enable
set accprofile "super_admin"
set wildcard enable
set remote-group "ldap_grp"
next
end
Configuring least privileges for LDAP admin account authentication in Active
Directory
An administrator should only have sufficient privileges for their role. In the case of LDA... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,819 | User & Authentication
Example
The Active Directory LDAP server, FORTINET-FSSO.com, is configured with two groups that contain two users each:
group1 consists of users test1 and test3; group2 consists of users test2 and test4.
To configure AD LDAP user groups in the GUI:
1. Configure the Active Directory LDAP server, FO... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,820 | User & Authentication
c. In the Remote Groups table, click Add. The Add Group Match pane opens.
d. For Remote Server, select FORTINET-FSSO.
e. In the search box, enter group1, and select the result in the table.
f. Click OK.
g. Repeat these steps to configure ldap2 with the FORTINET-FSSO group2.
h. Click OK.
3. Configu... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,821 | User & Authentication
7. Get user test2 to log out, and refresh the Firewall Users widget. There is a total of three active users, and the ldap2
group only has one user that is logged in.
To verify the user group count in the CLI:
# diagnose user-device-store user-count list <integer>
# diagnose user-device-store user-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,822 | User & Authentication
status. This WAD user is listed in the diagnose wad user list output. If the user is removed from WAD as an
authenticated, such as when the IP-based authentication expires, then the user is considered to become inactive (logout
status). The user is no longer listed in the diagnose wad user list ou... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,823 | User & Authentication
3. Configure the authentication scheme:
config authentication scheme
edit "basic-ldap"
set method basic
set user-database "ldap-test"
next
end
4. Configure the authentication rule:
config authentication rule
edit "basic-ldap"
set srcaddr "all"
set active-auth-method "basic-ldap"
set web-portal dis... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,824 | User & Authentication
To view the active user logged information for two days back from February 24, 2022:
# diagnose user-device-store user-stats query 2022-02-24 2
Record #0:
'username' = 'test3'
'groupname' = 'CN=Domain Admins,CN=Users,DC=FORTINETQA,DC=local'
'groupname' = 'CN=FSSO,OU=QA,DC=FORTINETQA,DC=local'
'log... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,825 | User & Authentication
The endpoint PC connecting to the web server will first need to authenticate to the explicit web proxy before accessing
the server.
While this example demonstrates an LDAP client certificate for an explicit proxy configuration, LDAP client certificates
can be used in firewall authentication, trans... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,826 | User & Authentication
To ensure the proper operation of LDAPS authentication, make sure that the CA that
signed the server certificate for the LDAPS server, typically a private CA, is trusted by the
FortiGate by uploading the private CA certificate. This is especially important for an
existing configuration where this ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,827 | User & Authentication
Testing and verification
When traffic from the endpoint PC matches a policy and triggers authentication, the FortiGate starts the LDAPS TLS
connection handshake with the Windows AD. The LDAPS server requests a client certificate to identify the FortiGate as
a client. The FortiGate provides a confi... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,828 | User & Authentication
l Configuring one or more RADIUS server profiles on the FortiGate.
l Assigning the RADIUS server profile to a user or user group.
l Applying the user or user group to a firewall policy.
RADIUS authentication can be applied to many FortiGate functions, such as firewall authentication, SSL and IPsec... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,829 | User & Authentication
GUI field CLI setting Description
Specify the IP address the FortiGate uses to
communicate with the RADIUS server. If left
unconfigured, the FortiGate will use the IP address of the
interface that communicates with the RADIUS server.
Include in every user
group
set all-usergroup {enable
| disable}... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,830 | User & Authentication
next
end
transport-protocol {udp |
tcp | tls}
Set the type of transport protocol to use:
l udp: use UDP (default)
l tcp: use TCP, but no TLS security
l tls: use TLS over TCP
To configure a RADSEC client with TLS:
config user radius
edit <name>
set transport-protocol tls
set ca-cert <string>
set cl... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,831 | User & Authentication
RADIUS Connection
When using TCP or UDP as transport, it is possible for the RADIUS protocol to be compromised by the vulnerability
described in CVE-2024-3596. In order to protect against this RADIUS vulnerability, as a RADIUS client, FortiGate will:
1. 1. Force the validation of message authentic... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,832 | User & Authentication
Secondary Server
IP/Name 2.2.2.2
Secret Enter the password used to connect to the RADIUS server.
3. Click OK.
Adding two RADIUS server profiles in the same user group
When two separate RADIUS profiles are added to a user group, the FortiGate sends an Access-Request simultaneously
to both RADIUS se... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,833 | User & Authentication
6. Click Add, select fac_radius_server, then click OK.
7. Click OK.
Using separate RADIUS server profiles for separate user groups
In this example, the FortiGate first evaluates if the user belongs to the first listed group (radius_group) in the policy. If the
user fails to authenticate to this gr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,834 | User & Authentication
RADIUS AVPs and VSAs
This topic describes RADIUS Attribute Value Pairs (AVPs) and Vendor-Specific Attributes (VSAs).
AVPs
RADIUS packets include a set of AVPs to identify information about the user, their location, and other information. The
IETF defined a set of 255 standard attributes, which are... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,835 | User & Authentication
The Fortinet RADIUS vendor ID is 12356 and contains the following attributes:
Attribute name Attribute number Attribute value format
Fortinet-Group-Name 1 String
Fortinet-Client-IP-Address 2 IP address
Fortinet-Vdom-Name* 3 String
Fortinet-Client-IPv6-Address 4 Octets
Fortinet-Interface-Name 5 Str... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,836 | User & Authentication
Attribute name Attribute number Attribute value format
Fortinet-Fpc-User-Role 40 String
Fortinet-Tenant-Identification 41 String
Fortinet-Host-Port-AVPair 42 String
* For Fortinet-Vdom-Name, users can be tied to a specific VDOM on the FortiGate. Refer to the documentation provided
by your RADIUS s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,837 | User & Authentication
set service "ALL"
set utm-status enable
set logtraffic all
set nat enable
next
end
5. To check the configuration, on a client PC:
a. Use a browser to access a web server.
b. Authenticate using RADIUS.
c. Browse the redirect to https://www.fortinet.com.
d. Check the list of authenticated users:
# d... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,838 | User & Authentication
To configure specific group matching in the GUI:
1. Go to User & Authentication > User Groups and edit the RADIUS_IT group.
2. In the Remote Groups table, select the RADIUS_NPS server and click Edit. The Add Group Match pane opens.
3. For Groups, select Specify and enter the group name configured ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,839 | User & Authentication
l BGP is used for any dynamic routing.
l You have configured authentication event logging under Log & Report.
Example.com has an office with 20 users on the internal network who need access to the Internet. The office network is
protected by a FortiGate-60C with access to the Internet through the ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,840 | User & Authentication
Interface Subnet Act as DHCP server Devices
wan1 172.20.120.141 No Internet service provider
dmz 10.11.101.100 No Servers including
RADIUS server
internal 10.11.102.100 Yes: x.x.x.110-250 Internal user network
1. Go to Network > Interfaces.
2. Edit wan1:
Alias Internet
Addressing Mode Manual
IP/Ne... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,841 | User & Authentication
Address Range 10.11.102.110 - 10.11.102.250
Netmask 255.255.255.0
Default Gateway Same as Interface IP
Comments Internal network
Administrative Status Up
To create a RADIUS SSO agent:
1. Go to Security Fabric > External Connectors.
2. Click Create New.
3. Under Endpoint/Identity, select RADIUS Sin... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,842 | User & Authentication
Schedule
You must configure a business_hours schedule. You can configure a standard Monday to Friday 8 AM to 5 PM
schedule, or whatever days and hours covers standard work hours at the company.
Address groups
You must configure the following address groups:
Name Interface Address range included
in... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,843 | User & Authentication
Service essential_network_services
Action ACCEPT
NAT ON
Security Profiles ON: AntiVirus, IPS
Log Allowed Traffic ON
Comments Essential network services
4. Click Create New, and configure the new policy as follows, then click OK:
Incoming Interface dmz
Source Address company_servers
Outgoing Interf... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,844 | User & Authentication
Incoming Interface Internal
Source Address internal_network
Source User(s) Select the user groups that you created for RSSO.
Outgoing Interface wan1
Destination Address all
Schedule business_hours
Service ALL
Action ACCEPT
NAT ON
Security Profiles ON: AntiVirus, Web Filter, IPS, and Email Filter. ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,845 | User & Authentication
authentication there is no RADIUS accounting, which can be required in some circumstances.
In this example, a Client PC is used as a VoIP gateway.
To configure FGT-B:
1. Configure a RADIUS user:
config user radius
edit "FreeRADIUS"
set server "172.18.60.203"
set secret **********
set acct-interim-... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,846 | User & Authentication
set device-identification enable
set snmp-index 12
config ipv6
set ip6-address 2008::8/64
set ip6-allowaccess ping https http
end
next
end
5. Configure a policy:
config firewall policy
edit 1
set name "pol1"
set srcintf "port10"
set dstintf "port9"
set action accept
set srcaddr "all"
set dstaddr "... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,847 | User & Authentication
----- 1 listed, 0 filtered ------
3. Check the RADIUS accounting start messages in the traffic between FGT-B and the RADIUS server. The MAC
address of FGT-B is the Called-Station-Id, and the IP address of the Client PC is the User-Name.
RSA ACE (SecurID) servers
SecurID is a two-factor system prod... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,848 | User & Authentication
a. Configure the RSA SecurID 130 appliance.
b. Configure the FortiGate as an agent host on the RSA ACE/Server.
3. Configure the RADIUS server in FortiOS.
4. Create a SecurID user group.
5. Create a SecurID user.
6. Configure authentication with SecurID.
The following instructions are based on RSA ... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,849 | User & Authentication
To configure the RADIUS server in FortiOS:
1. Go to User & Authentication > RADIUS Servers, then click Create New.
2. Configure the following:
Name RSA
Authentication method Select Default.
Primary Server
IP/Name 192.168.100.102. You can click Test to ensure the IP address is correct and
that Fort... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,850 | User & Authentication
l PPTP VPN on page 2851
l SSL VPN
Unless stated otherwise, the following examples use default values.
Security policy
The example creates a security policy that allows HTTP, FTP, and POP3 traffic from the internal interface to WAN1. If
these interfaces are not available in FortiOS, substitute othe... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,851 | User & Authentication
SSL VPN
You must map the SecurID user group to the portal that will serve SecurID users and include the SecurID user group in
the security policy's Source User(s) field.
To map the SecurID group to an SSL VPN portal:
1. Go to VPN > SSL-VPN Settings.
2. Under Authentication/Portal Mapping, click Cr... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,852 | User & Authentication
To configure group match in the user group:
1. Go to User & Authentication > User Groups.
2. Click Create New.
3. Enter a name for the group, and set Type to Firewall.
4. In the Remote Groups table, click Add.
5. Set Remote Server to the just created RADIUS server, FAC193.
6. Set Groups to Specify... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,853 | User & Authentication
Sending multiple RADIUS attribute values in a single RADIUS Access-Request
A managed FortiSwitch can be configured to send multiple RADIUS attribute values in a single RADIUS AccessRequest. This option is configured per RADIUS user, and is set to none by default.
The available service type option... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
2,854 | User & Authentication
When a user logs in to two devices through RADIUS authentication. The authentication and authorization flow is as
follows:
1. The user logs in to a device and the authentication is sent to the FortiGate.
2. The FortiGate sends the Access-Request message to the RADIUS server.
3. The RADIUS server s... | https://fortinetweb.s3.amazonaws.com/docs.fortinet.com/v2/attachments/3afdbab8-dcdc-11ef-8766-ca4255feedd9/FortiOS-7.6.2-Administration_Guide.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.