FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
tino_p
Staff
Staff
Article Id 244896
Description This article explains the behaviors when using mixed policies in Firewall authentication with LDAP user-group defined in the source section.
Scope FortiGate, LDAP authentication.
Solution

1) User group (Block) connects to LDAP server:

 

tino_p_0-1675677408156.png

 

2) Firewall policy defines 3 policies:


- TEMP: DENY traffic with Block group.

- Test: ALLOW traffic with Block group.

- www: ALLOW traffic without any group.

 

tino_p_1-1675677408172.png

 

3) Behaviors:

 

3.1) Any initial traffic port9 will not match the 'TEMP' or 'test' policy, because it is needed both user (in Grp_None_Internet) and IP address (all), so it will match the 'www' policy to allow traffic to the Internet.

 

This is the behavior observed: users still can access the Internet although there is a DENY policy (TEMP).

 

tino_p_2-1675677408197.png

 

3.2) When 'www' is disabled, the user will receive a login prompt (because all policies that could match the source IP have authentication enabled – it is 'TEMP' and 'test').

 

tino_p_3-1675677408206.png

 

tino_p_4-1675677408221.png

 

This is the behavior observed: At this time, if the user authenticates successfully, that account should show up in User Dashboard:

 

tino_p_5-1675677408231.png

 

And the traffic will match 'TEMP' policy:

 

tino_p_6-1675677408238.png

 

tino_p_7-1675677408295.png

 

User will not get Internet access:

 

tino_p_8-1675677408313.png

 

4) Workaround/Solution, how it should work:

 

4.1) Create a new group to allow Internet.

 

tino_p_9-1675677408322.png

 

4.2) Define it in the firewall policy, so that users will need to enter the credentials to access the Internet.

 

tino_p_10-1675677408335.png

 

tino_p_11-1675677408347.png

 

tino_p_12-1675677408386.png

 

4.3) If the user fails to authenticate, it will not get the Internet:

 

tino_p_13-1675677408411.png

 

Notes:

- LDAP is an active authentication method, so users will need to enter the credentials to authenticate to Firewall.

- FSSO is a passive authentication method, so users do NOT need to enter the credentials to authenticate to Firewall.

- If it is not wanted that the users enter credentials to get resource access, it is suggested to use FSSO method (passive authentication).

- With LDAP authentication only, it is more logical to users enter credentials to get resource access than enter credentials to be blocked.