Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
I built the policy-based routes, and it looks like it works like it should, but just to be sure I understand correctly:
- if there are several internal ports / subnets, one needs to create a source IP-based policy route for each of them (with the external being last in order), otherwise everything from the IP(s) will be thrown through the - in my case - wan2 interface;
- there is no way to say: this policy route applies to all destinations except for instance an internal subnet;
- if there are several IPs, one has to either build by hand routes for each of them, or group them together so that they are all within a mask block, you can' t use the nice firewall object groups that the other policies allows one to use;
- or alternatively if there are only a few external IPs that need to be connected to through a specific wan connection, it is easier to do static routes for them;
Did I get everything right? It' s a bit of a headache to do it this way in our case, but I guess Fortinet is working on improving this area. It would make a lot of sense, at least to me, when you could use objects here instead of just IPs/subnets.
FortiOS 5.0 supports authentication-based routing by creating an identity-based route that associates a user group with one or more routes. This identity-based route is then added to a security policy and all traffic from users authenticated by this user group is routed to the gateway. This feature is configured from the CLI and can be useful for MSSPs who need to route users from different organizations to different Internet gateways. Enter the following command to add an identity-based route that routes all traffic from users in the company1-user-group and the company2-user-group user groups out the wan1 interface to a next-hop router with IP address 172.20.120.2.We haven' t yet upgraded to 5.0.2 (or was that already in 5.0/5.0.1?), so I can' t try it, but does anybody know more about how it works? Does it only work with authentificated users in user groups (which we don' t currently have implemented) or can one simply create a IP-based group manually and use that as a selector?config firewall identity-based-route edit new-id-route config rule edit 1 set gateway 172.20.120.2 set device wan1 set groups company1-user-group company2-user-group end endEnter the following command to add the identity-based route to a security policy:config firewall policy edit 1 ... set identity-based enable set identity-based-route new-id-route ... end
Bob - self proclaimed posting junkie!
See my Fortigate related scripts at: http://fortigate.camerabob.com
| User | Count |
|---|---|
| 2792 | |
| 1423 | |
| 812 | |
| 748 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.