Hello,
I have unfortunatelly upgraded our FortiGate to v6.2 in a hurry without checking release notes just to find out Device Groups have been removed.
Is there any workaround except for creating custom Addresses for MAC range manually?
It was really nice that I could just open Device Inventory, find the device where I want to block access to the internet (or allow full access), assign it to a group and everything was set.
Now I have to go to Device inventory, copy the MAC address, create a new MAC range address, paste the MAC, add the device name, and assign it to an Address Group.
Is there any faster way to do this?
Also is there a way to convert all my current Custom Devices to MAC address ranges so at least I don't have to rewrite them manually?
This was really a bad move from Fortinet.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
I agree that this was a bit unexpected move but if you look deeper you may notice that they actually follow the zero-trust course, thus you have to identify every single element on the network and no unknown devices are allowed to lurk around :) You can see a lot of authentication improvement and developments in 6.2 so they definitely pushing the connected-device (IoT) and (probably) user identification to full extent.
I would wait for 6.2.1 or 6.2.001 just for now :)
Thanks for the reply. Yea I can see what they are trying to do, but for our scenario it is not a good approach. We have a lot of guests, visitors, maintenance guys, etc, who need to connect to the internet and I have set up 3 policies for internet access: completely blocked (except for software/av updates), default limited (allowing only business sites and social networks with 30 min quota) and admin access with everything allowed.
I have marked few devices in the construction area which are used by workers to have no internet access, office PCs and phones are using limited access and then few devices with admin access.Also any quest (non-marked devices) get limited access aswell.
Since it is a mix of LAN/Wifi access in different buildings it was easiest to set up this way. I know I could set this all up using VLANs and some kind of ACL on Wifi APs (most of them are not Forti APs), but it all adds to the complexity and is not that flexible, for example when moved from one place to another, or roaming between two different buildings and Wifi networks. I know this is less secure because anyone could theoretically change their MAC address to the one where net is allowed, but in our environment it is not likely to happen and I am ok with the risk.
Anyway I guess I will program a tool to convert currently set custom devices to MAC addresses and add them to the policy this way, and hopefully in the future they will change their mind.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1731 | |
1105 | |
752 | |
447 | |
240 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.