I'm attempting to set up an external captive portal for our Fortigate
51e (5.6.2). But, instead of sending a connected machine to the captive
portal, it presents them with the disclaimer/user agreement page and
then lets it through. When I then disco...
I'm looking to set up a Mac Address bypass system that will require each
user to enroll their device via remote captive portal in order for that
device to gain full net access (the purpose of this is for usage
auditing). The process would be as follo...
I'm in the process of building out a system that will let users register
their devices with our internal system for auditing purposes. We'll be
tracking them by MAC address and having them enroll each device via
external Captive Portal. So, my questi...
I'm building out a remote captive portal and am wondering if it's
possible to install existing wildcard SSL cert onto my FortiGate 51E
(FortiOS 5.6.2) rather than generate one on the box and get it signed.
We're running a fairly small operation and would like to be able to
expose the DHCP Monitor and Firewall User Monitor data on a page for the
admins at the couple of facilities where we have our Fortigate 51E units
without granting them access to the ...
Well, despite my earlier comment, I'm having issues running GET calls
against the API. The docs read as follows: "If login is successful, the
response will contain the authentication token in the APSCOOKIE cookie
value. This cookie value must be incl...
Follow-up: Using my IDE's REST client, I'm able to do the auth process
and get my CSRF token just fine. However, when I use cURL to do this
programmatically, all of my cookie values come back as "0&260" (this
might have actually been "0&0", as "%26" ...
Alright, I have the API working now in an API tester. How long is the
CSRF token good for before it expires? For the person who was originally
asking, the docs on the Fortinet site are indeed just plain wrong and it
does not use a standard http auth ...