Hello,
We’re experiencing an issue where firewall policies that use LDAP-based user groups are not functioning as expected. Our goal is to restrict access to certain websites for specific LDAP users.
Here’s what we’ve done so far:
Configured an LDAP server.
Created a user group, fetched users from LDAP, and applied the group to the firewall policy.
Additionally, we set up an external connector for the Active Directory Server, fetched the required users through it, and used the same FSSO user group in the firewall policy.
Unfortunately, the configuration isn’t working as intended.
Could someone please assist us in troubleshooting this issue and provide guidance on how to resolve it?
First of all if you are able to fetch the groups thats a good start.
Have you added in the firewall policy the network subnet in addition to the user group?
What did you exactly configure in the firewall policy that is not working exactly?
Hi,
Thanks for your reply.
I have created a firewall policy and defined the following source (user group and all).
Also in the source when we assigned only IP of the user, then the policy worked perfectly.
When we try to test with user group policy, it doesn't work.
| User | Count |
|---|---|
| 2699 | |
| 1413 | |
| 810 | |
| 713 | |
| 455 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.