Support Forum
The Forums are a place to find answers on a range of Fortinet products from peers and product experts.
Sadhi_Jayz
New Contributor II

Integration of FortiGate, Huawei NAC, and FortiAuthenticator for BYOD Authentication

Hello Fortinet Community,

 

I have a network environment consisting of a FortiGate , Windows Active Directory 2019, Huawei iMaster NAC, and a newly purchased FortiAuthenticator . Both the FortiGate firewall and Huawei NAC are configured to authenticate users from Windows Active Directory using LDAP.

Here’s the current workflow:

 

  1. When a user device connects to a switchport, the iMaster NAC detects the user and identifies their organizational unit (OU) (e.g., HR, Technical, etc.).
  2. Based on the detected OU, the switch assigns an IP address to the user from the corresponding VLAN (e.g., VLAN 10 for HR, VLAN 20 for Technical).
  3. After successful NAC authentication, the FortiGate firewall presents a captive portal when the user attempts to access the internet or DMZ. Upon successful authentication via the firewall portal, the appropriate policies are applied based on the user.

The issue arises because users are required to enter their credentials twice: once for NAC authentication and again for the FortiGate firewall captive portal. This dual authentication is inconvenient and negatively impacts the user experience.

 

Unfortunately, I cannot utilize Fortinet Single Sign-On (FSSO) as a solution because many users are on BYOD devices that are not joined to the Active Directory domain.

 

I am looking for a solution to integrate these systems more efficiently with only one captive portal for both NAC and FortiGate firewall.

CP.png

 

Any recommendations or guidance on how to achieve this would be greatly appreciated! Thank you in advance.

 

1 Solution
AEK

Hi Sadhi

Basically you keep authenticating with your NAC via RADIUS, and FGT listens for RADIUS accounting records, and so FGT will record the user info (user, group, IP), and you can use them in your firewall rules.

You can start here.

https://docs.fortinet.com/document/fortigate/6.2.16/cookbook/85730/radius-single-sign-on-rsso-agent

 

But I guess this is not the unique existing solution for your requirement.

For example there should be a solution where you pull (or forward) login events from your (RADIUS) NAC to your FAC, and then use them on your FortiGate. Or you can configure your NAC to authenticate users from your FAC, and then use them on your FortiGate.

Hope it helps.

AEK

View solution in original post

AEK
9 REPLIES 9
sjoshi
Staff
Staff

Since now you have brought FortiAuth in the picture.. is it also playing the role for user auth?

Also in the FGT lan to internet policy have you called user group in that policy?

Let us know if this helps.
Salon Raj Joshi
Sadhi_Jayz
New Contributor II

Dear @sjoshi ,

 

FortiAuthenticator is a fresh device with just interface and static route configurations.

sjoshi

So basically your NAC device is also performing the authentication then again the FortiGate correct?

Let us know if this helps.
Salon Raj Joshi
Sadhi_Jayz
New Contributor II

Yes.

 

NAC authenticates the user first. Then the firewall.

sjoshi

then it is expected to get 2 trigger. I believe you have used user group on fortigate internet policy. So whenever traffic matches that policy captive portal will get trigger.

You can either remove the user group from fgt policy or remove the auth from the NAC and only use it to assign the respective vlan

Let us know if this helps.
Salon Raj Joshi
AEK
SuperUser
SuperUser

Hi Sadhi

If you are using RADIUS for WiFi authentication then RSSO can be a solution.

AEK
AEK
Sadhi_Jayz
New Contributor II

Hello @AEK ,

 

Could you please elaborate further ?

 

AEK

Hi Sadhi

Basically you keep authenticating with your NAC via RADIUS, and FGT listens for RADIUS accounting records, and so FGT will record the user info (user, group, IP), and you can use them in your firewall rules.

You can start here.

https://docs.fortinet.com/document/fortigate/6.2.16/cookbook/85730/radius-single-sign-on-rsso-agent

 

But I guess this is not the unique existing solution for your requirement.

For example there should be a solution where you pull (or forward) login events from your (RADIUS) NAC to your FAC, and then use them on your FortiGate. Or you can configure your NAC to authenticate users from your FAC, and then use them on your FortiGate.

Hope it helps.

AEK
AEK
Sadhi_Jayz
New Contributor II

Dear @AEK ,

 

Thank you for providing this information. The solution appears to be quite promising, and I appreciate your effort in sharing it.

Announcements

Select Forum Responses to become Knowledge Articles!

Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.

Labels
Top Kudoed Authors