LAB 5 - Firewall Authentication
LAB 5 - Firewall Authentication
Objectives
Configure server-based password authentication with an LDAP server.
Configure captive portal so users connecting to your network are forced to authenticate.
Time to Complete
Estimated: 20 minutes
Prerequisites
Before beginning this lab, you must restore a configuration file to FortiGate.
1 Remote Authentication
In this exercise, you will configure an LDAP server on FortiGate for remote authentication, create a
remote authentication group for your remote users, and add that group as a source in a firewall policy.
Finally, you will authenticate over SSL-VPN as one of the remote users, and then monitor the login as
the administrator.
Field Value
Name ADserver
Server IP/Name 10.0.1.10
This is the IP address of the Windows Server, Local-
Windows VM. For more information, see Network Topology.
Server Port 389
This is the default port for LDAP.
Common Name Identifier cn
This is the attribute name used to find the user name. Active
Directory calls this cn.
Distinguished Name ou=Training,dc=trainingAD,dc=training,dc=lab
This is the domain name for Active Directory on the Windows
Server. Active Directory has already been pre-configured,
with all users located in the Training organizational unit (ou).
Bind Type Regular
User DN cn=ADadmin,cn=users,dc=trainingAD,dc=training,dc=lab
We are using the credentials of an Active Directory user
called ADadmin to authenticate to Active Directory. ADadmin
is located in the Users organizational unit (ou).
Password Training!
This is the password pre-configured for the ADadmin user.
You must use it to be able to bind.
4. Click Test.
5. Click OK.
Note: The Remote-users group was pre-configured for you. However, it needs to be
modified to add the users from the remote LDAP server you just configured in the last
procedure.
AD-users will appear disabled with a green checkmark, indicating it has been added.
5. Click OK.
The users in this Active Directory group are now included in your FortiGate Remote-users firewall
user group. Only users from the remote LDAP server that match this user group entry can
authenticate.
6. Click OK.
Note: Configuring SSL-VPN is out of scope for this lab. As such, the SSL-VPN settings
have been pre-configured for you. However, you still need to configure an SSL-VPN
firewall policy and add the Remote-user group to it.
diagnose test authserver ldap <LDAP server name> <LDAP user name>
<password>
Where:
<LDAP server name> is ADserver (case-sensitive)
<LDAP user name> is aduser1
<password> is Training!
2. Close PuTTY.
3. Click Quick Connection and in the URL field, type www.google.com and click Launch.
5. Remain logged into the SSL VPN portal and continue to the next procedure.
You will notice back in the Local-FortiGate GUI (where you are logged in as admin) that Monitor
> SSL-VPN Monitor no longer shows the authentication, as the connection is not active.
However, FortiView > VPN retains the login information.
5. Close all your browser tabs except for the tab with the Local-FortiGate GUI.
2 Captive Portal
In this exercise, you will configure captive portal and restrict access to a specific user group. Captive
portal is a convenient way to authenticate Web users on wired or WiFi networks through an HTML
form that requests a user name and password (active authentication).
This exercise involves creating a user group (and adding a user to it); enabling captive portal and
restricting access based on that group; and enabling the disclaimer message.
Finally, you will authenticate through captive portal and monitor the authentication.
Field Value
Name CP-group
Type Firewall
Members student
4. Click OK.
Field Value
Security Mode Captive Portal
Authentication Portal Local
User Access Restricted to Groups
User Groups CP-group
Note: If captive portal is enabled through WiFi, you can enable disclaimers through the
GUI (WiFi & Switch Controller > SSID). We are using a wired interface in this lab.
edit 1
end
4. Close PuTTY.
Note: While the CLI config user setting dictates how long a user authenticating
through captive portal can remain authenticated, you can choose to manually de-
authenticate a captive portal user by selecting the user in the Firewall User Monitor list and
clicking De-authenticate. Once de-authenticated, the user disappears from the list, as it is
reserved for active users only.
3. Select student and click De-authenticate to manually end the user's session.
4. Click OK.
5. Close the browser.