Description
This article describes how to configure a disclaimer page on a firewall policy level.
The disclaimer will be shown whenever users connects for the first time and they will have to accept it to get internet access.
Scope
FortiGate.
Solution
The goal is to present a disclaimer page for users connected behind port2 (Guest Network) whenever these users want to access the internet (routed via port1).
The disclaimer page is already created by default on the FortiGate, but can be edited according to the needs.
This can be done via the GUI:
Go to System -> Replacement Messages -> Extended View -> Authentication -> Disclaimer Page
The second step is to enable the disclaimer on the policy level.
It will be needed to either create a new policy or find the policy ID which allows traffic from the Guest Network to the internet.
In this example, a simple policy with NAT is allowing traffic from port2 (Guest) to port1 (Internet) :
If the ID column is not showing up, it is possible to enable it as shown on below screenshot:
Once the user accepts the disclaimer, their IP will be included in the command below.
Based on the following output, if the client IP 192.168.3.2 remains in the authentication list, the disclaimer page will not appear when accessing the server.
diagnose firewall auth list
192.168.3.2
type: disclaimer, id: 2, duration: 20, idled: 15
expire: 44, allow-idle: 60
flag(1000): src_idle
----- 1 listed, 0 filtered ------
Furthermore, after clearing the client IP from the authentication list, the disclaimer page will appear upon the next attempt.
Additionally, to display the disclaimer page using the FQDN rather than the FortiGate IP, then configure the FQDN under auth-portal.
config firewall auth-portal
set portal-addr <FQDN>
end
To disable the disclaimer page on the policy:
Check the source interface for example: port2 and disable the 'Security mode':
Network ---->interface--->port2
Note:
This option when enabled can configure the authentication portal, user and group access, custom portal messages, exempt sources and destinations/services, and redirect after the captive portal but if not using or specifying any of the mentioned here then it can be disabled.
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.