Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Fortigate process all policy from the top down approach. For policy#1, it only process all traffics destine for http/https and DNS. Any traffic that is not http/https or dns, will get process by policy#2.
Rule #1 has a source that includes a user.
Unless you re using some kind of passive authentication (FSSO or RSSO) then you are not authenticated, so you don't match the user on policy 1 .. so your source does not match and you fall down to policy #2.
Having authentication enabled on polciy #1 does NOT force users to authenticate.
To do that .. you need to EITHER have authentication on BOTH policies ... or set the security mode on the ingress interface to captive portal.
Friends, there was no problem when v5.0.x. But v5.2.x authentication logic works differently. I could not solve. Passive authentication, which is, that I want to use the rule I take with FSSO users. I do not want to use the Captive Portal.
yaba wrote:Friends, there was no problem when v5.0.x. But v5.2.x authentication logic works differently. I could not solve. Passive authentication, which is, that I want to use the rule I take with FSSO users. I do not want to use the Captive Portal.
I think we have the same setup. And the upgrade to 5.2.2 broke our guest net.
If i disable captive portal the user gets denied byt the implicit deny and with captive portal the auth-redirect is broken (it doesnt redirect with fqdn, just the IP).
It seems that in 5.2 there is something wrong with the Identity based policies.
Anybody else have theese problems? Anbody have a solution?
We are using theese policies for out wifi-guest-net with Radius authentication.
Going by this document:
http://docs.fortinet.com/uploaded/files/2021/fortigate-cookbook-52.pdf
The policy looks fine. I couldnt make it work either.
Just remember in 5.2 there is always implicit policy fall-through, even if a LDAP or RADIUS group is referenced in the policy. If you are going to use a later policy, make sure that the same source/destination pair isn't referenced. If you want to use an 'all', instead use some combination of 'srcaddr-negate', 'dstaddr-negate', and 'service-negate'. That way, you can make sure that later policies don't match your authentication policy. The implicit fall-through shouldn't match the implicit deny though.
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1641 | |
1069 | |
751 | |
443 | |
210 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.