Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
NoBubbles
New Contributor

Captive Portal in Firewall Policies

I am looking for a bit of guidance on how to get captive portal access to resources working based on firewall policies on a Fortigate (currently running 7.2.x).  More specifically, I want to restrict management access to devices to authenticated users while allowing full access to the services running on those devices.

 

For example, if I have users on Vlan 10 and Vlan 20 with Windows servers on Vlan 30 and Linux servers on Vlan 40, I would like to restrict RDP from Vlans 10 and 20 to Vlan 30 to only authenticated users while allow SMB through for everyone.  At the same time I would like to restrict RDP from Vlans 10 and 20 to Vlan 40 to only authenticated users while allowing HTTP and HTTPS through.

 

Can anyone point me at a complete, end-to-end How-To on how I achieve this, including where the (FQDN) captive portal could/should sit, please?

1 Solution
jiahoong112
Staff
Staff

There are multiple ways to go about this. FSSO or 802.1X

https://community.fortinet.com/t5/FortiAuthenticator/Technical-Tip-FortiAuthenticator-802-1x-EAP-TLS...

https://community.fortinet.com/t5/FortiAuthenticator/Technical-Tip-Configure-Windows-Client-for-Wire...

https://docs.fortinet.com/document/fortigate/7.6.2/administration-guide/576158/configuring-fsso-fire... 

 

Firewall policies are then used for role based access control.

**If you come across a resolution, kindly show your appreciation by liking and accepting it, ensuring its accessibility for others**

View solution in original post

1 REPLY 1
jiahoong112
Staff
Staff

There are multiple ways to go about this. FSSO or 802.1X

https://community.fortinet.com/t5/FortiAuthenticator/Technical-Tip-FortiAuthenticator-802-1x-EAP-TLS...

https://community.fortinet.com/t5/FortiAuthenticator/Technical-Tip-Configure-Windows-Client-for-Wire...

https://docs.fortinet.com/document/fortigate/7.6.2/administration-guide/576158/configuring-fsso-fire... 

 

Firewall policies are then used for role based access control.

**If you come across a resolution, kindly show your appreciation by liking and accepting it, ensuring its accessibility for others**
Announcements
Check out our Community Chatter Blog! Click here to get involved
Labels
Top Kudoed Authors