FortiGate
FortiGate Next Generation Firewall utilizes purpose-built security processors and threat intelligence security services from FortiGuard labs to deliver top-rated protection and high performance, including encrypted traffic.
evejar
Staff
Staff
Article Id 192133

Description

 

This article explains how to configure a captive portal for LDAP users.

 

Scope

 

FortiGate.


Solution

 

  1. Configure the LDAP Server: Go to User & Authentication -> LDAP Server. Select 'create new' and configure as follows:

 

 
  1. Go to User & Authentication -> User Groups and configure the LDAP user group. Select 'create new' and configure as follows:

    captive portal1.png
  2. Enable the captive portal in the interface or SSID: Enable Security Mode and captive portal. In the user groups section, select the User group created in step 2.

    captive portal2.png
  3. Create a firewall policy to allow traffic for the user group:
 captive portal3.png

 

Note: Only certain traffic can trigger a captive portal redirection. If specific services are selected instead of ALL, it is required to allow at least one of the following services to trigger the captive portal:

  • HTTP.
  • HTTPS.
  • FTP.
  • Telnet.


Unauthenticated DNS requests are allowed:
If a firewall policy has a user or group configured in the source field, and the firewall policy allows the 'ALL' or 'DNS' service, TCP and UDP port 53 DNS traffic is allowed regardless of authentication status. This is because some DNS access is likely required to initially trigger the captive portal.


This only applies to destination port 53 traffic. No other service is allowed through the captive portal firewall policy without successful user authentication.
 
If some but not all DNS servers should be allowed without authentication, consider configuring a separate policy to specify allowed DNS servers, and configuring the main outbound internet policy to not allow DNS.

 

Related articles:

Troubleshooting Tip: General captive portal explanation, flow and troubleshooting

Technical Tip: Creating Captive Portal with LDAP users via policy-based