FortiDDoS
FortiDDoS protects from both known and zero day attacks with very low latency. It’s easy to deploy and manage, and includes comprehensive reporting and analysis tools.
kmak
Staff
Staff
Article Id 413750
Description This article describes the steps to configure FortiDDoS-F remote administration account using TACACS+ authentication from FortiAuthenticator.
Scope FortiDDoS-F, FortiAuthenticator.
Solution

FortiDDoS-F supports three remote authentication methods for the administration account they are RADIUS, LDAP, and TACACS+. This article shows the example of creating the remote administration account in FortiAuthenticator and using the TACACS+ authentication method to authenticate the administration account login to the FortiDDoS-F device.

 

  1. In the FortiAuthenticator Network Interface settings, enable the TACACS+ Auth service. Save the setting, and FortiAuthenticator will reload itself.
                                                                                  
kmak_13-1759541454275.jpeg

 

  1. Navigate to the TACACS+ Service -> Clients page, create a client profile for the FortiDDoS device. Insert the IP address of the FortiDDoS device that will be used to connect to the FortiAuthenticator. Create a random string for the secret key and store it in a text file for later insertion into FortiDDoS TACACS+ settings.
                                                                                             
kmak_14-1759541454277.jpeg

 

  1. Create a new policy in TACACS+ Service and select the FortiDDoS profile for the policy.
                                                                                            
kmak_15-1759541454281.jpeg

 

  1. In the same policy setting wizard, select the user group realm for the FortiDDoS authentication account group. The default local user is used in this example.
                                                                                                    

kmak_16-1759541454284.jpeg

 

  1. Leave other settings as default, save, and exit the policy settings. The TACACS+ policy for FortiDDoS can be seen on the page now.
                                                                                              
kmak_17-1759541454286.jpeg

 

  1. Next, create the Authorization -> Services profile for FortiDDoS. Insert a name for the profile, and the Service text box must be 'fortiddos'; FortiDDoS would not be able to authenticate if the service name does not match. Add the TACACS+ service attribute-value pair, following the name and value below.
  • Attribute: Fortinet-FDD-Access-Profile.
  • Value: super_admin_prof (can be other profile, profile name case must match the group profile created in FortiDDoS).

 

kmak_18-1759541454288.jpeg

 

  1. Review the Authorization Service profile after it is created.
                                                                                         
kmak_19-1759541454290.jpeg

 

  1. Now navigate to the Authorization -> Rules page and create an authorization rule profile. Select the Authorization Service profile and leave other configurations as default.
                                                                           
kmak_20-1759541454293.jpeg

 

  1. In the local user page, create or edit the existing users to be used for the remote authentication.
                                                                                                          
kmak_21-1759541454295.jpeg

 

  1. In the user edit page, expand the TACACS+ option. Select the TACACS+ authorization rule created in step 8 from the dropdown menu. The configuration in FortiAuthenticator is now completed.
                                                                                                           
kmak_22-1759541454298.jpeg

 

  1. Now log in to the FortiDDoS-F GUI using the admin account. Navigate to the System -> Authentication page and go to the TACACS+ tab. Toggle to enable the TACACS+ Server configuration. Insert the FortiAuthenticator IP and the secret key generated in step 2. Leave other settings as the default.
                                                                                        
kmak_23-1759541454300.jpeg

 

  1. The TACACS+ admin account login should be working now. Try to open a new browser tab in private browser or incognito mode and test the TACACS+ user login.
                                                                                                           
kmak_24-1759541454303.jpeg

 

  1. Check the FortiAuthenticator logs to verify the user logon.
                                                                                         
kmak_25-1759541454308.jpeg

 

Related document:

Configuring TACACS+ authentication
Contributors